🛡️ SafeC Security Analysis Report

Analysis Target: ./Juliet-TestCases/

Critical

1549

High

5487

Medium

40

Low

0
[1] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_connect_socket_61b.c | Line 88, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_connect_socket_61b.c | Line 163, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_connect_socket_62b.cpp | Line 91, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_connect_socket_62b.cpp | Line 164, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_connect_socket_64b.c | Line 47, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_connect_socket_64b.c | Line 79, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[7] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_connect_socket_64b.c | Line 107, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[8] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_fgets_61b.c | Line 32, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[9] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_fgets_61b.c | Line 64, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[10] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_fgets_62b.cpp | Line 35, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[11] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_fgets_62b.cpp | Line 65, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[12] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_fgets_64b.c | Line 27, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[13] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_fgets_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[14] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_fgets_64b.c | Line 87, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[15] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_fscanf_61b.c | Line 25, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[16] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_fscanf_61b.c | Line 46, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[17] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_fscanf_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[18] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_fscanf_62b.cpp | Line 47, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[19] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_fscanf_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[20] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_fscanf_64b.c | Line 57, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[21] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_fscanf_64b.c | Line 85, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[22] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_large_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[23] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_large_64b.c | Line 57, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[24] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_large_64b.c | Line 85, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[25] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_listen_socket_61b.c | Line 97, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[26] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_listen_socket_61b.c | Line 185, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[27] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_listen_socket_64b.c | Line 47, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[28] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_listen_socket_64b.c | Line 79, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[29] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_listen_socket_64b.c | Line 107, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[30] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_rand_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[31] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_rand_64b.c | Line 57, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[32] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE129_rand_64b.c | Line 85, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[33] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_51b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[34] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_51b.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[35] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_52c.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[36] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_52c.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[37] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_53d.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[38] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_53d.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[39] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_54e.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[40] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_54e.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[41] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_63b.c | Line 27, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[42] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_63b.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[43] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_64b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[44] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_64b.c | Line 49, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[45] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_65b.c | Line 26, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[46] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_65b.c | Line 41, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[47] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_66b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[48] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_66b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[49] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_67b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[50] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_67b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[51] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_68b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[52] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_68b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[53] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_72b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[54] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_72b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[55] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_73b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[56] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_73b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[57] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_74b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[58] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memcpy_74b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[59] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_51b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[60] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_51b.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[61] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_52c.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[62] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_52c.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[63] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_53d.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[64] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_53d.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[65] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_54e.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[66] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_54e.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[67] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_63b.c | Line 27, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[68] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_63b.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[69] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_64b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[70] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_64b.c | Line 49, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[71] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_65b.c | Line 26, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[72] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_65b.c | Line 41, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[73] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_66b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[74] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_66b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[75] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_67b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[76] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_67b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[77] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_68b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[78] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_68b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[79] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_72b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[80] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_72b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[81] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_73b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[82] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_73b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[83] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_74b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[84] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE131_memmove_74b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[85] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_22b.c | Line 35, Column 19
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[86] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_22b.c | Line 64, Column 19
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[87] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_22b.c | Line 79, Column 19
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[88] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_22b.c | Line 94, Column 19
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[89] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_51b.c | Line 33, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[90] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_51b.c | Line 49, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[91] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_51b.c | Line 61, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[92] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_52c.c | Line 33, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[93] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_52c.c | Line 49, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[94] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_52c.c | Line 61, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[95] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_53d.c | Line 33, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[96] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_53d.c | Line 49, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[97] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_53d.c | Line 61, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[98] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_54e.c | Line 33, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[99] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_54e.c | Line 49, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[100] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_54e.c | Line 61, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[101] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_63b.c | Line 34, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[102] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_63b.c | Line 51, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[103] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_63b.c | Line 64, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[104] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_64b.c | Line 37, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[105] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_64b.c | Line 57, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[106] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_64b.c | Line 73, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[107] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_65b.c | Line 33, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[108] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_65b.c | Line 49, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[109] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_65b.c | Line 61, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[110] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_66b.c | Line 35, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[111] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_66b.c | Line 52, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[112] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_66b.c | Line 65, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[113] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_67b.c | Line 39, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[114] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_67b.c | Line 56, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[115] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_67b.c | Line 69, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[116] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_68b.c | Line 38, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[117] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_68b.c | Line 55, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[118] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_68b.c | Line 68, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[119] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_72b.cpp | Line 38, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[120] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_72b.cpp | Line 55, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[121] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_72b.cpp | Line 68, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[122] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_73b.cpp | Line 38, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[123] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_73b.cpp | Line 55, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[124] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_73b.cpp | Line 68, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[125] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_74b.cpp | Line 38, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[126] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_74b.cpp | Line 55, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[127] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE135_74b.cpp | Line 68, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[128] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_51b.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[129] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_51b.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[130] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_52c.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[131] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_52c.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[132] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_53d.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[133] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_53d.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[134] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_54e.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[135] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_54e.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[136] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_63b.c | Line 34, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[137] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_63b.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[138] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_64b.c | Line 37, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[139] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_64b.c | Line 56, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[140] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_65b.c | Line 33, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[141] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_65b.c | Line 48, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[142] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_66b.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[143] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_66b.c | Line 51, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[144] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_67b.c | Line 39, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[145] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_67b.c | Line 55, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[146] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_68b.c | Line 39, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[147] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_68b.c | Line 55, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[148] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_72b.cpp | Line 41, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[149] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_72b.cpp | Line 57, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[150] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_73b.cpp | Line 41, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[151] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_73b.cpp | Line 57, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[152] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_74b.cpp | Line 41, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[153] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s01/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_cpy_74b.cpp | Line 57, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[154] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_51b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[155] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_51b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[156] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_52c.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[157] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_52c.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[158] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_53d.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[159] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_53d.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[160] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_54e.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[161] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_54e.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[162] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_63b.c | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[163] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_63b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[164] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_64b.c | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[165] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_64b.c | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[166] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_65b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[167] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_65b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[168] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_66b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[169] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_66b.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[170] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_67b.c | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[171] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_67b.c | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[172] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_68b.c | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[173] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_68b.c | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[174] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_72b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[175] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_72b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[176] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_73b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[177] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_73b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[178] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_74b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[179] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memcpy_74b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[180] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_51b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[181] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_51b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[182] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_52c.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[183] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_52c.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[184] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_53d.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[185] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_53d.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[186] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_54e.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[187] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_54e.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[188] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_63b.c | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[189] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_63b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[190] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_64b.c | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[191] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_64b.c | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[192] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_65b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[193] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_65b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[194] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_66b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[195] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_66b.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[196] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_67b.c | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[197] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_67b.c | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[198] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_68b.c | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[199] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_68b.c | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[200] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_72b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[201] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_72b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[202] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_73b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[203] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_73b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[204] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_74b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[205] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_memmove_74b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[206] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_51b.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[207] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_51b.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[208] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_52c.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[209] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_52c.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[210] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_53d.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[211] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_53d.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[212] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_54e.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[213] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_54e.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[214] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_63b.c | Line 35, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[215] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_63b.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[216] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_64b.c | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[217] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_64b.c | Line 58, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[218] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_65b.c | Line 34, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[219] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_65b.c | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[220] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_66b.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[221] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_66b.c | Line 53, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[222] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_67b.c | Line 40, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[223] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_67b.c | Line 57, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[224] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_68b.c | Line 40, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[225] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_68b.c | Line 57, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[226] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_72b.cpp | Line 42, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[227] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_72b.cpp | Line 59, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[228] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_73b.cpp | Line 42, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[229] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_73b.cpp | Line 59, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[230] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_74b.cpp | Line 42, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[231] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_alloca_ncpy_74b.cpp | Line 59, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[232] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_51b.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[233] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_51b.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[234] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_52c.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[235] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_52c.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[236] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_53d.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[237] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_53d.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[238] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_54e.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[239] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_54e.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[240] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_63b.c | Line 34, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[241] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_63b.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[242] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_64b.c | Line 37, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[243] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_64b.c | Line 56, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[244] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_65b.c | Line 33, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[245] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_65b.c | Line 48, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[246] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_66b.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[247] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_66b.c | Line 51, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[248] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_67b.c | Line 39, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[249] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_67b.c | Line 55, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[250] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_68b.c | Line 39, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[251] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_68b.c | Line 55, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[252] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_72b.cpp | Line 41, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[253] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_72b.cpp | Line 57, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[254] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_73b.cpp | Line 41, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[255] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_73b.cpp | Line 57, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[256] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_74b.cpp | Line 41, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[257] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_cpy_74b.cpp | Line 57, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[258] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_51b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[259] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_51b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[260] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_52c.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[261] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_52c.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[262] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_53d.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[263] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_53d.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[264] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_54e.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[265] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_54e.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[266] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_63b.c | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[267] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_63b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[268] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_64b.c | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[269] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_64b.c | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[270] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_65b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[271] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_65b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[272] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_66b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[273] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_66b.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[274] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_67b.c | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[275] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_67b.c | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[276] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_68b.c | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[277] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_68b.c | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[278] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_72b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[279] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_72b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[280] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_73b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[281] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_73b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[282] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_74b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[283] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memcpy_74b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[284] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_51b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[285] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_51b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[286] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_52c.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[287] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_52c.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[288] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_53d.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[289] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_53d.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[290] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_54e.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[291] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_54e.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[292] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_63b.c | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[293] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_63b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[294] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_64b.c | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[295] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_64b.c | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[296] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_65b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[297] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_65b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[298] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_66b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[299] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_66b.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[300] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_67b.c | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[301] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_67b.c | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[302] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_68b.c | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[303] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_68b.c | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[304] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_72b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[305] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_72b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[306] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_73b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[307] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_73b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[308] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_74b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[309] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_memmove_74b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[310] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_51b.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[311] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_51b.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[312] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_52c.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[313] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_52c.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[314] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_53d.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[315] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_53d.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[316] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_54e.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[317] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_54e.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[318] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_63b.c | Line 35, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[319] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_63b.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[320] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_64b.c | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[321] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_64b.c | Line 58, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[322] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_65b.c | Line 34, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[323] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_65b.c | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[324] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_66b.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[325] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_66b.c | Line 53, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[326] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_67b.c | Line 40, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[327] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_67b.c | Line 57, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[328] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_68b.c | Line 40, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[329] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_68b.c | Line 57, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[330] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_72b.cpp | Line 42, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[331] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_72b.cpp | Line 59, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[332] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_73b.cpp | Line 42, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[333] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_73b.cpp | Line 59, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[334] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_74b.cpp | Line 42, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[335] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_char_declare_ncpy_74b.cpp | Line 59, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[336] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_51b.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[337] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_51b.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[338] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_52c.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[339] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_52c.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[340] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_53d.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[341] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_53d.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[342] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_54e.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[343] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_54e.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[344] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_63b.c | Line 34, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[345] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_63b.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[346] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_64b.c | Line 37, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[347] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_64b.c | Line 56, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[348] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_65b.c | Line 33, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[349] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_65b.c | Line 48, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[350] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_66b.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[351] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_66b.c | Line 51, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[352] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_67b.c | Line 39, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[353] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_67b.c | Line 55, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[354] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_68b.c | Line 39, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[355] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_68b.c | Line 55, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[356] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_72b.cpp | Line 41, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[357] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_72b.cpp | Line 57, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[358] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_73b.cpp | Line 41, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[359] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_73b.cpp | Line 57, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[360] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_74b.cpp | Line 41, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[361] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_cpy_74b.cpp | Line 57, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[362] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_51b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[363] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_51b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[364] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_52c.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[365] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_52c.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[366] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_53d.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[367] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_53d.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[368] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_54e.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[369] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_54e.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[370] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_63b.c | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[371] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_63b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[372] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_64b.c | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[373] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_64b.c | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[374] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_65b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[375] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_65b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[376] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_66b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[377] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_66b.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[378] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_67b.c | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[379] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_67b.c | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[380] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_68b.c | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[381] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_68b.c | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[382] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_72b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[383] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_72b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[384] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_73b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[385] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_73b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[386] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_74b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[387] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memcpy_74b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[388] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_51b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[389] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_51b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[390] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_52c.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[391] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_52c.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[392] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_53d.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[393] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_53d.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[394] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_54e.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[395] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_54e.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[396] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_63b.c | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[397] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_63b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[398] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_64b.c | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[399] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_64b.c | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[400] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_65b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[401] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_65b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[402] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_66b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[403] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_66b.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[404] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_67b.c | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[405] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_67b.c | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[406] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_68b.c | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[407] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_68b.c | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[408] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_72b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[409] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_72b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[410] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_73b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[411] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_73b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[412] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_74b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[413] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_alloca_memmove_74b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[414] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_51b.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[415] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_51b.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[416] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_52c.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[417] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_52c.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[418] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_53d.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[419] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_53d.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[420] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_54e.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[421] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_54e.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[422] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_63b.c | Line 34, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[423] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_63b.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[424] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_64b.c | Line 37, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[425] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_64b.c | Line 56, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[426] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_65b.c | Line 33, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[427] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_65b.c | Line 48, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[428] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_66b.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[429] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_66b.c | Line 51, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[430] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_67b.c | Line 39, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[431] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_67b.c | Line 55, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[432] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_68b.c | Line 39, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[433] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_68b.c | Line 55, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[434] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_72b.cpp | Line 41, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[435] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_72b.cpp | Line 57, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[436] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_73b.cpp | Line 41, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[437] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_73b.cpp | Line 57, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[438] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_74b.cpp | Line 41, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[439] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s02/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_cpy_74b.cpp | Line 57, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[440] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_51b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[441] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_51b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[442] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_52c.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[443] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_52c.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[444] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_53d.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[445] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_53d.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[446] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_54e.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[447] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_54e.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[448] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_63b.c | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[449] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_63b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[450] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_64b.c | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[451] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_64b.c | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[452] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_65b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[453] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_65b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[454] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_66b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[455] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_66b.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[456] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_67b.c | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[457] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_67b.c | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[458] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_68b.c | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[459] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_68b.c | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[460] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_72b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[461] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_72b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[462] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_73b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[463] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_73b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[464] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_74b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[465] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memcpy_74b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[466] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_51b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[467] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_51b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[468] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_52c.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[469] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_52c.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[470] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_53d.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[471] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_53d.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[472] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_54e.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[473] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_54e.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[474] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_63b.c | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[475] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_63b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[476] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_64b.c | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[477] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_64b.c | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[478] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_65b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[479] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_65b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[480] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_66b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[481] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_66b.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[482] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_67b.c | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[483] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_67b.c | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[484] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_68b.c | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[485] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_68b.c | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[486] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_72b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[487] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_72b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[488] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_73b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[489] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_73b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[490] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_74b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[491] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE193_wchar_t_declare_memmove_74b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[492] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_51b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[493] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_51b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[494] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_52c.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[495] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_52c.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[496] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_53d.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[497] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_53d.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[498] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_54e.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[499] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_54e.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[500] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_63b.c | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[501] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_63b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[502] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_64b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[503] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_64b.c | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[504] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_65b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[505] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_65b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[506] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_66b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[507] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_66b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[508] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_67b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[509] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_67b.c | Line 55, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[510] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_68b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[511] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_68b.c | Line 55, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[512] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[513] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_72b.cpp | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[514] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[515] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_73b.cpp | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[516] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[517] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memcpy_74b.cpp | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[518] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_51b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[519] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_51b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[520] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_52c.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[521] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_52c.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[522] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_53d.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[523] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_53d.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[524] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_54e.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[525] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_54e.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[526] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_63b.c | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[527] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_63b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[528] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_64b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[529] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_64b.c | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[530] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_65b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[531] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_65b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[532] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_66b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[533] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_66b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[534] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_67b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[535] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_67b.c | Line 55, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[536] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_68b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[537] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_68b.c | Line 55, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[538] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_72b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[539] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_72b.cpp | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[540] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_73b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[541] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_73b.cpp | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[542] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_74b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[543] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_memmove_74b.cpp | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[544] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_51b.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[545] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_51b.c | Line 49, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[546] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_52c.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[547] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_52c.c | Line 49, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[548] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_53d.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[549] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_53d.c | Line 49, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[550] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_54e.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[551] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_54e.c | Line 49, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[552] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_63b.c | Line 31, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[553] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_63b.c | Line 49, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[554] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_64b.c | Line 34, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[555] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_64b.c | Line 55, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[556] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_65b.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[557] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_65b.c | Line 47, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[558] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_66b.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[559] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_66b.c | Line 50, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[560] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_67b.c | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[561] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_67b.c | Line 54, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[562] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_68b.c | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[563] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_68b.c | Line 54, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[564] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_72b.cpp | Line 38, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[565] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_72b.cpp | Line 56, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[566] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_73b.cpp | Line 38, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[567] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_73b.cpp | Line 56, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[568] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_74b.cpp | Line 38, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[569] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncat_74b.cpp | Line 56, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[570] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_51b.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[571] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_51b.c | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[572] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_52c.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[573] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_52c.c | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[574] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_53d.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[575] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_53d.c | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[576] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_54e.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[577] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_54e.c | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[578] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_63b.c | Line 31, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[579] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_63b.c | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[580] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_64b.c | Line 34, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[581] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_64b.c | Line 56, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[582] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_65b.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[583] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_65b.c | Line 48, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[584] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_66b.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[585] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_66b.c | Line 51, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[586] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_67b.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[587] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_67b.c | Line 55, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[588] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_68b.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[589] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_68b.c | Line 55, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[590] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[591] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_72b.cpp | Line 57, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[592] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[593] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_73b.cpp | Line 57, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[594] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[595] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_alloca_ncpy_74b.cpp | Line 57, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[596] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_51b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[597] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_51b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[598] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_52c.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[599] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_52c.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[600] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_53d.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[601] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_53d.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[602] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_54e.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[603] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_54e.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[604] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_63b.c | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[605] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_63b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[606] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_64b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[607] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_64b.c | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[608] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_65b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[609] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_65b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[610] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_66b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[611] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_66b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[612] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_67b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[613] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_67b.c | Line 55, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[614] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_68b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[615] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_68b.c | Line 55, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[616] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[617] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_72b.cpp | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[618] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[619] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_73b.cpp | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[620] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[621] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memcpy_74b.cpp | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[622] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_51b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[623] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_51b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[624] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_52c.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[625] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_52c.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[626] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_53d.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[627] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_53d.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[628] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_54e.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[629] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_54e.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[630] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_63b.c | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[631] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_63b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[632] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_64b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[633] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_64b.c | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[634] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_65b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[635] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_65b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[636] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_66b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[637] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_66b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[638] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_67b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[639] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_67b.c | Line 55, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[640] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_68b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[641] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_68b.c | Line 55, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[642] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_72b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[643] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_72b.cpp | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[644] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_73b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[645] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_73b.cpp | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[646] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_74b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[647] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_memmove_74b.cpp | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[648] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_51b.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[649] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_51b.c | Line 49, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[650] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_52c.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[651] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_52c.c | Line 49, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[652] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_53d.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[653] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_53d.c | Line 49, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[654] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_54e.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[655] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_54e.c | Line 49, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[656] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_63b.c | Line 31, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[657] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_63b.c | Line 49, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[658] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_64b.c | Line 34, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[659] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_64b.c | Line 55, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[660] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_65b.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[661] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_65b.c | Line 47, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[662] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_66b.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[663] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_66b.c | Line 50, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[664] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_67b.c | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[665] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_67b.c | Line 54, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[666] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_68b.c | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[667] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_68b.c | Line 54, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[668] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_72b.cpp | Line 38, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[669] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_72b.cpp | Line 56, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[670] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_73b.cpp | Line 38, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[671] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_73b.cpp | Line 56, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[672] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_74b.cpp | Line 38, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[673] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncat_74b.cpp | Line 56, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[674] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_51b.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[675] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_51b.c | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[676] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_52c.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[677] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_52c.c | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[678] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_53d.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[679] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_53d.c | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[680] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_54e.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[681] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_54e.c | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[682] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_63b.c | Line 31, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[683] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_63b.c | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[684] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_64b.c | Line 34, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[685] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_64b.c | Line 56, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[686] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_65b.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[687] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_65b.c | Line 48, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[688] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_66b.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[689] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_66b.c | Line 51, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[690] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_67b.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[691] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_67b.c | Line 55, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[692] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_68b.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[693] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_68b.c | Line 55, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[694] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[695] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_72b.cpp | Line 57, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[696] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[697] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_73b.cpp | Line 57, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[698] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[699] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s03/CWE121_Stack_Based_Buffer_Overflow__CWE805_char_declare_ncpy_74b.cpp | Line 57, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[700] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_51b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[701] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_51b.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[702] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_52c.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[703] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_52c.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[704] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_53d.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[705] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_53d.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[706] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_54e.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[707] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_54e.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[708] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_63b.c | Line 27, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[709] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_63b.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[710] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_64b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[711] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_64b.c | Line 49, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[712] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_65b.c | Line 26, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[713] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_65b.c | Line 41, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[714] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_66b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[715] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_66b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[716] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_67b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[717] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_67b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[718] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_68b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[719] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_68b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[720] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_72b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[721] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_72b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[722] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_73b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[723] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_73b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[724] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_74b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[725] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memcpy_74b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[726] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_51b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[727] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_51b.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[728] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_52c.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[729] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_52c.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[730] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_53d.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[731] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_53d.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[732] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_54e.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[733] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_54e.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[734] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_63b.c | Line 27, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[735] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_63b.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[736] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_64b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[737] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_64b.c | Line 49, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[738] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_65b.c | Line 26, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[739] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_65b.c | Line 41, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[740] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_66b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[741] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_66b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[742] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_67b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[743] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_67b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[744] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_68b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[745] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_68b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[746] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_72b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[747] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_72b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[748] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_73b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[749] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_73b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[750] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_74b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[751] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_alloca_memmove_74b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[752] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_51b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[753] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_51b.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[754] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_52c.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[755] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_52c.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[756] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_53d.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[757] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_53d.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[758] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_54e.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[759] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_54e.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[760] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_63b.c | Line 27, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[761] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_63b.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[762] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_64b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[763] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_64b.c | Line 49, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[764] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_65b.c | Line 26, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[765] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_65b.c | Line 41, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[766] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_66b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[767] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_66b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[768] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_67b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[769] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_67b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[770] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_68b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[771] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_68b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[772] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_72b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[773] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_72b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[774] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_73b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[775] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_73b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[776] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_74b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[777] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memcpy_74b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[778] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_51b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[779] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_51b.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[780] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_52c.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[781] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_52c.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[782] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_53d.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[783] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_53d.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[784] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_54e.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[785] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_54e.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[786] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_63b.c | Line 27, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[787] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_63b.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[788] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_64b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[789] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_64b.c | Line 49, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[790] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_65b.c | Line 26, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[791] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_65b.c | Line 41, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[792] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_66b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[793] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_66b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[794] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_67b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[795] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_67b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[796] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_68b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[797] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_68b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[798] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_72b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[799] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_72b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[800] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_73b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[801] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_73b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[802] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_74b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[803] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int64_t_declare_memmove_74b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[804] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_51b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[805] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_51b.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[806] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_52c.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[807] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_52c.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[808] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_53d.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[809] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_53d.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[810] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_54e.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[811] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_54e.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[812] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_63b.c | Line 27, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[813] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_63b.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[814] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_64b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[815] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_64b.c | Line 49, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[816] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_65b.c | Line 26, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[817] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_65b.c | Line 41, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[818] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_66b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[819] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_66b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[820] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_67b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[821] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_67b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[822] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_68b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[823] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_68b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[824] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_72b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[825] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_72b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[826] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_73b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[827] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_73b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[828] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_74b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[829] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memcpy_74b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[830] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_51b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[831] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_51b.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[832] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_52c.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[833] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_52c.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[834] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_53d.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[835] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_53d.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[836] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_54e.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[837] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_54e.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[838] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_63b.c | Line 27, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[839] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_63b.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[840] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_64b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[841] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_64b.c | Line 49, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[842] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_65b.c | Line 26, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[843] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_65b.c | Line 41, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[844] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_66b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[845] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_66b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[846] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_67b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[847] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_67b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[848] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_68b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[849] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_68b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[850] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_72b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[851] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_72b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[852] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_73b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[853] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_73b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[854] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_74b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[855] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_alloca_memmove_74b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[856] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_51b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[857] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_51b.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[858] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_52c.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[859] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_52c.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[860] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_53d.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[861] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_53d.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[862] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_54e.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[863] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_54e.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[864] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_63b.c | Line 27, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[865] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_63b.c | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[866] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_64b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[867] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_64b.c | Line 49, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[868] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_65b.c | Line 26, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[869] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_65b.c | Line 41, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[870] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_66b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[871] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_66b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[872] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_67b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[873] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_67b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[874] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_68b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[875] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_68b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[876] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_72b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[877] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_72b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[878] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_73b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[879] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_73b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[880] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_74b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[881] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memcpy_74b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[882] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_51b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[883] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_51b.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[884] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_52c.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[885] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_52c.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[886] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_53d.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[887] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_53d.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[888] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_54e.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[889] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_54e.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[890] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_63b.c | Line 27, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[891] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_63b.c | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[892] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_64b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[893] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_64b.c | Line 49, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[894] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_65b.c | Line 26, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[895] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_65b.c | Line 41, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[896] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_66b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[897] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_66b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[898] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_67b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[899] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_67b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[900] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_68b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[901] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_68b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[902] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_72b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[903] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_72b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[904] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_73b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[905] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_73b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[906] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_74b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[907] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_int_declare_memmove_74b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[908] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_51b.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[909] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_51b.c | Line 61, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[910] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_52c.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[911] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_52c.c | Line 61, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[912] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_53d.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[913] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_53d.c | Line 61, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[914] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_54e.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[915] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_54e.c | Line 61, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[916] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_63b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[917] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_63b.c | Line 61, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[918] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_64b.c | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[919] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_64b.c | Line 67, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[920] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_65b.c | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[921] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_65b.c | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[922] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_66b.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[923] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_66b.c | Line 62, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[924] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_67b.c | Line 41, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[925] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_67b.c | Line 66, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[926] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_68b.c | Line 41, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[927] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_68b.c | Line 66, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[928] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_72b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[929] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_72b.cpp | Line 68, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[930] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_73b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[931] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_73b.cpp | Line 68, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[932] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_74b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[933] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s04/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memcpy_74b.cpp | Line 68, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[934] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_51b.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[935] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_51b.c | Line 61, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[936] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_52c.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[937] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_52c.c | Line 61, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[938] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_53d.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[939] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_53d.c | Line 61, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[940] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_54e.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[941] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_54e.c | Line 61, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[942] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_63b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[943] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_63b.c | Line 61, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[944] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_64b.c | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[945] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_64b.c | Line 67, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[946] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_65b.c | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[947] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_65b.c | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[948] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_66b.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[949] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_66b.c | Line 62, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[950] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_67b.c | Line 41, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[951] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_67b.c | Line 66, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[952] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_68b.c | Line 41, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[953] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_68b.c | Line 66, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[954] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_72b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[955] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_72b.cpp | Line 68, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[956] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_73b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[957] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_73b.cpp | Line 68, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[958] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_74b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[959] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_alloca_memmove_74b.cpp | Line 68, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[960] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_51b.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[961] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_51b.c | Line 61, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[962] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_52c.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[963] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_52c.c | Line 61, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[964] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_53d.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[965] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_53d.c | Line 61, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[966] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_54e.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[967] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_54e.c | Line 61, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[968] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_63b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[969] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_63b.c | Line 61, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[970] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_64b.c | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[971] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_64b.c | Line 67, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[972] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_65b.c | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[973] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_65b.c | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[974] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_66b.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[975] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_66b.c | Line 62, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[976] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_67b.c | Line 41, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[977] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_67b.c | Line 66, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[978] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_68b.c | Line 41, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[979] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_68b.c | Line 66, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[980] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_72b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[981] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_72b.cpp | Line 68, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[982] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_73b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[983] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_73b.cpp | Line 68, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[984] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_74b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[985] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memcpy_74b.cpp | Line 68, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[986] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_51b.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[987] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_51b.c | Line 61, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[988] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_52c.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[989] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_52c.c | Line 61, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[990] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_53d.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[991] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_53d.c | Line 61, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[992] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_54e.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[993] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_54e.c | Line 61, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[994] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_63b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[995] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_63b.c | Line 61, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[996] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_64b.c | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[997] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_64b.c | Line 67, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[998] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_65b.c | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[999] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_65b.c | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1000] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_66b.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1001] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_66b.c | Line 62, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1002] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_67b.c | Line 41, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1003] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_67b.c | Line 66, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1004] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_68b.c | Line 41, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1005] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_68b.c | Line 66, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1006] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_72b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1007] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_72b.cpp | Line 68, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1008] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_73b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1009] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_73b.cpp | Line 68, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1010] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_74b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1011] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_struct_declare_memmove_74b.cpp | Line 68, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1012] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_51b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1013] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_51b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1014] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_52c.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1015] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_52c.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1016] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_53d.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1017] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_53d.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1018] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_54e.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1019] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_54e.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1020] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_63b.c | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1021] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_63b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1022] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_64b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1023] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_64b.c | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1024] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_65b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1025] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_65b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1026] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_66b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1027] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_66b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1028] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_67b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1029] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_67b.c | Line 55, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1030] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_68b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1031] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_68b.c | Line 55, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1032] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1033] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_72b.cpp | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1034] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1035] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_73b.cpp | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1036] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1037] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memcpy_74b.cpp | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1038] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_51b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1039] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_51b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1040] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_52c.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1041] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_52c.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1042] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_53d.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1043] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_53d.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1044] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_54e.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1045] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_54e.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1046] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_63b.c | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1047] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_63b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1048] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_64b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1049] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_64b.c | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1050] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_65b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1051] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_65b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1052] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_66b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1053] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_66b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1054] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_67b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1055] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_67b.c | Line 55, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1056] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_68b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1057] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_68b.c | Line 55, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1058] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_72b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1059] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_72b.cpp | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1060] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_73b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1061] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_73b.cpp | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1062] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_74b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1063] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_alloca_memmove_74b.cpp | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1064] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_51b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1065] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_51b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1066] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_52c.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1067] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_52c.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1068] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_53d.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1069] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_53d.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1070] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_54e.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1071] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_54e.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1072] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_63b.c | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1073] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_63b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1074] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_64b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1075] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_64b.c | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1076] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_65b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1077] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_65b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1078] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_66b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1079] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_66b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1080] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_67b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1081] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_67b.c | Line 55, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1082] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_68b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1083] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_68b.c | Line 55, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1084] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1085] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_72b.cpp | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1086] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1087] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_73b.cpp | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1088] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1089] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memcpy_74b.cpp | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1090] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_51b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1091] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_51b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1092] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_52c.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1093] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_52c.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1094] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_53d.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1095] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_53d.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1096] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_54e.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1097] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_54e.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1098] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_63b.c | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1099] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_63b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1100] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_64b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1101] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_64b.c | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1102] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_65b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1103] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_65b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1104] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_66b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1105] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_66b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1106] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_67b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1107] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_67b.c | Line 55, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1108] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_68b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1109] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_68b.c | Line 55, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1110] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_72b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1111] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_72b.cpp | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1112] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_73b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1113] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_73b.cpp | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1114] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_74b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1115] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s05/CWE121_Stack_Based_Buffer_Overflow__CWE805_wchar_t_declare_memmove_74b.cpp | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1116] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_51b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1117] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_51b.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1118] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_52c.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1119] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_52c.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1120] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_53d.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1121] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_53d.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1122] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_54e.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1123] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_54e.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1124] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_63b.c | Line 29, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1125] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_63b.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1126] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_64b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1127] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_64b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1128] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_65b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1129] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_65b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1130] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_66b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1131] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_66b.c | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1132] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_67b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1133] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_67b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1134] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_68b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1135] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_68b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1136] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1137] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_72b.cpp | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1138] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1139] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_73b.cpp | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1140] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1141] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memcpy_74b.cpp | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1142] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_51b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1143] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_51b.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1144] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_52c.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1145] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_52c.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1146] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_53d.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1147] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_53d.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1148] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_54e.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1149] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_54e.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1150] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_63b.c | Line 29, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1151] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_63b.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1152] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_64b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1153] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_64b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1154] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_65b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1155] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_65b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1156] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_66b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1157] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_66b.c | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1158] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_67b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1159] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_67b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1160] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_68b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1161] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_68b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1162] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_72b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1163] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_72b.cpp | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1164] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_73b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1165] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_73b.cpp | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1166] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_74b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1167] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_memmove_74b.cpp | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1168] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_51b.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1169] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_51b.c | Line 46, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1170] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_52c.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1171] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_52c.c | Line 46, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1172] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_53d.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1173] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_53d.c | Line 46, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1174] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_54e.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1175] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_54e.c | Line 46, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1176] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_63b.c | Line 29, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1177] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_63b.c | Line 46, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1178] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_64b.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1179] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_64b.c | Line 52, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1180] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_65b.c | Line 28, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1181] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_65b.c | Line 44, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1182] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_66b.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1183] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_66b.c | Line 47, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1184] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_67b.c | Line 34, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1185] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_67b.c | Line 51, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1186] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_68b.c | Line 34, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1187] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_68b.c | Line 51, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1188] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_72b.cpp | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1189] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_72b.cpp | Line 53, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1190] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_73b.cpp | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1191] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_73b.cpp | Line 53, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1192] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_74b.cpp | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1193] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncat_74b.cpp | Line 53, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1194] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_51b.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1195] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_51b.c | Line 46, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1196] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_52c.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1197] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_52c.c | Line 46, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1198] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_53d.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1199] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_53d.c | Line 46, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1200] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_54e.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1201] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_54e.c | Line 46, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1202] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_63b.c | Line 29, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1203] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_63b.c | Line 46, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1204] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_64b.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1205] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_64b.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1206] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_65b.c | Line 28, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1207] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_65b.c | Line 44, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1208] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_66b.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1209] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_66b.c | Line 47, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1210] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_67b.c | Line 34, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1211] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_67b.c | Line 51, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1212] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_68b.c | Line 34, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1213] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_68b.c | Line 51, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1214] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1215] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_72b.cpp | Line 53, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1216] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1217] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_73b.cpp | Line 53, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1218] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1219] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_alloca_ncpy_74b.cpp | Line 53, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1220] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_51b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1221] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_51b.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1222] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_52c.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1223] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_52c.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1224] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_53d.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1225] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_53d.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1226] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_54e.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1227] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_54e.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1228] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_63b.c | Line 29, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1229] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_63b.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1230] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_64b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1231] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_64b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1232] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_65b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1233] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_65b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1234] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_66b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1235] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_66b.c | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1236] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_67b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1237] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_67b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1238] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_68b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1239] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_68b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1240] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1241] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_72b.cpp | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1242] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1243] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_73b.cpp | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1244] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1245] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memcpy_74b.cpp | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1246] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_51b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1247] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_51b.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1248] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_52c.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1249] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_52c.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1250] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_53d.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1251] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_53d.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1252] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_54e.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1253] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_54e.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1254] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_63b.c | Line 29, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1255] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_63b.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1256] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_64b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1257] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_64b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1258] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_65b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1259] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_65b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1260] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_66b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1261] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_66b.c | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1262] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_67b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1263] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_67b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1264] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_68b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1265] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_68b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1266] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_72b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1267] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_72b.cpp | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1268] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_73b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1269] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_73b.cpp | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1270] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_74b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1271] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_memmove_74b.cpp | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1272] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_51b.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1273] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_51b.c | Line 46, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1274] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_52c.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1275] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_52c.c | Line 46, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1276] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_53d.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1277] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_53d.c | Line 46, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1278] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_54e.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1279] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_54e.c | Line 46, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1280] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_63b.c | Line 29, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1281] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_63b.c | Line 46, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1282] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_64b.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1283] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_64b.c | Line 52, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1284] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_65b.c | Line 28, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1285] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_65b.c | Line 44, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1286] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_66b.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1287] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_66b.c | Line 47, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1288] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_67b.c | Line 34, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1289] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_67b.c | Line 51, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1290] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_68b.c | Line 34, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1291] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_68b.c | Line 51, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1292] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_72b.cpp | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1293] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_72b.cpp | Line 53, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1294] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_73b.cpp | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1295] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_73b.cpp | Line 53, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1296] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_74b.cpp | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1297] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncat_74b.cpp | Line 53, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1298] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_51b.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1299] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_51b.c | Line 46, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1300] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_52c.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1301] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_52c.c | Line 46, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1302] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_53d.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1303] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_53d.c | Line 46, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1304] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_54e.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1305] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_54e.c | Line 46, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1306] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_63b.c | Line 29, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1307] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_63b.c | Line 46, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1308] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_64b.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1309] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_64b.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1310] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_65b.c | Line 28, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1311] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_65b.c | Line 44, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1312] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_66b.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1313] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_66b.c | Line 47, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1314] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_67b.c | Line 34, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1315] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_67b.c | Line 51, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1316] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_68b.c | Line 34, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1317] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_68b.c | Line 51, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1318] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1319] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_72b.cpp | Line 53, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1320] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1321] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_73b.cpp | Line 53, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1322] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1323] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s06/CWE121_Stack_Based_Buffer_Overflow__CWE806_char_declare_ncpy_74b.cpp | Line 53, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1324] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_51b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1325] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_51b.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1326] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_52c.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1327] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_52c.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1328] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_53d.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1329] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_53d.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1330] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_54e.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1331] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_54e.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1332] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_63b.c | Line 29, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1333] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_63b.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1334] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_64b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1335] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_64b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1336] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_65b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1337] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_65b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1338] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_66b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1339] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_66b.c | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1340] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_67b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1341] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_67b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1342] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_68b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1343] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_68b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1344] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1345] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_72b.cpp | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1346] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1347] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_73b.cpp | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1348] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1349] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memcpy_74b.cpp | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1350] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_51b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1351] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_51b.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1352] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_52c.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1353] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_52c.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1354] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_53d.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1355] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_53d.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1356] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_54e.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1357] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_54e.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1358] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_63b.c | Line 29, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1359] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_63b.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1360] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_64b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1361] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_64b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1362] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_65b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1363] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_65b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1364] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_66b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1365] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_66b.c | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1366] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_67b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1367] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_67b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1368] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_68b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1369] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_68b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1370] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_72b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1371] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_72b.cpp | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1372] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_73b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1373] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_73b.cpp | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1374] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_74b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1375] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_alloca_memmove_74b.cpp | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1376] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_51b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1377] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_51b.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1378] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_52c.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1379] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_52c.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1380] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_53d.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1381] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_53d.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1382] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_54e.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1383] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_54e.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1384] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_63b.c | Line 29, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1385] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_63b.c | Line 46, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1386] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_64b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1387] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_64b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1388] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_65b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1389] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_65b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1390] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_66b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1391] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_66b.c | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1392] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_67b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1393] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_67b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1394] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_68b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1395] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_68b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1396] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1397] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_72b.cpp | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1398] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1399] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_73b.cpp | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1400] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1401] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memcpy_74b.cpp | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1402] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_51b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1403] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_51b.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1404] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_52c.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1405] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_52c.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1406] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_53d.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1407] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_53d.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1408] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_54e.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1409] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_54e.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1410] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_63b.c | Line 29, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1411] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_63b.c | Line 46, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1412] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_64b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1413] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_64b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1414] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_65b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1415] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_65b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1416] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_66b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1417] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_66b.c | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1418] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_67b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1419] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_67b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1420] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_68b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1421] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_68b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1422] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_72b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1423] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_72b.cpp | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1424] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_73b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1425] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_73b.cpp | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1426] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_74b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1427] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s07/CWE121_Stack_Based_Buffer_Overflow__CWE806_wchar_t_declare_memmove_74b.cpp | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1428] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_51b.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1429] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_51b.c | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1430] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_52c.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1431] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_52c.c | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1432] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_53d.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1433] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_53d.c | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1434] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_54e.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1435] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_54e.c | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1436] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_63b.c | Line 31, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1437] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_63b.c | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1438] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_64b.c | Line 34, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1439] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_64b.c | Line 55, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1440] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_65b.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1441] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_65b.c | Line 47, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1442] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_66b.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1443] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_66b.c | Line 50, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1444] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_67b.c | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1445] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_67b.c | Line 54, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1446] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_68b.c | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1447] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_68b.c | Line 54, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1448] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_72b.cpp | Line 38, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1449] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_72b.cpp | Line 56, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1450] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_73b.cpp | Line 38, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1451] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_73b.cpp | Line 56, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1452] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_74b.cpp | Line 38, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1453] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cat_74b.cpp | Line 56, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1454] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_51b.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1455] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_51b.c | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1456] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_52c.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1457] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_52c.c | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1458] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_53d.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1459] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_53d.c | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1460] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_54e.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1461] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_54e.c | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1462] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_63b.c | Line 31, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1463] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_63b.c | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1464] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_64b.c | Line 34, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1465] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_64b.c | Line 55, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1466] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_65b.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1467] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_65b.c | Line 47, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1468] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_66b.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1469] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_66b.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1470] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_67b.c | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1471] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_67b.c | Line 54, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1472] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_68b.c | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1473] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_68b.c | Line 54, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1474] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1475] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_72b.cpp | Line 56, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1476] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1477] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_73b.cpp | Line 56, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1478] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1479] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_alloca_cpy_74b.cpp | Line 56, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1480] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_51b.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1481] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_51b.c | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1482] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_52c.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1483] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_52c.c | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1484] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_53d.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1485] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_53d.c | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1486] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_54e.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1487] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_54e.c | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1488] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_63b.c | Line 31, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1489] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_63b.c | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1490] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_64b.c | Line 34, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1491] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_64b.c | Line 55, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1492] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_65b.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1493] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_65b.c | Line 47, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1494] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_66b.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1495] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_66b.c | Line 50, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1496] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_67b.c | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1497] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_67b.c | Line 54, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1498] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_68b.c | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1499] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_68b.c | Line 54, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1500] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_72b.cpp | Line 38, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1501] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_72b.cpp | Line 56, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1502] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_73b.cpp | Line 38, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1503] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_73b.cpp | Line 56, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1504] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_74b.cpp | Line 38, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1505] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cat_74b.cpp | Line 56, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1506] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_51b.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1507] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_51b.c | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1508] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_52c.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1509] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_52c.c | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1510] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_53d.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1511] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_53d.c | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1512] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_54e.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1513] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_54e.c | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1514] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_63b.c | Line 31, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1515] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_63b.c | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1516] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_64b.c | Line 34, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1517] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_64b.c | Line 55, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1518] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_65b.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1519] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_65b.c | Line 47, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1520] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_66b.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1521] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_66b.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1522] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_67b.c | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1523] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_67b.c | Line 54, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1524] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_68b.c | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1525] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_68b.c | Line 54, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1526] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1527] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_72b.cpp | Line 56, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1528] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1529] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_73b.cpp | Line 56, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1530] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1531] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_char_declare_cpy_74b.cpp | Line 56, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1532] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_51b.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1533] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_51b.c | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1534] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_52c.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1535] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_52c.c | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1536] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_53d.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1537] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_53d.c | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1538] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_54e.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1539] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_54e.c | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1540] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_63b.c | Line 31, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1541] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_63b.c | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1542] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_64b.c | Line 34, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1543] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_64b.c | Line 55, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1544] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_65b.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1545] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_65b.c | Line 47, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1546] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_66b.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1547] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_66b.c | Line 50, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1548] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_67b.c | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1549] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_67b.c | Line 54, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1550] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_68b.c | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1551] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_68b.c | Line 54, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1552] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_72b.cpp | Line 38, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1553] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_72b.cpp | Line 56, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1554] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_73b.cpp | Line 38, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1555] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_73b.cpp | Line 56, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1556] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_74b.cpp | Line 38, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1557] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cat_74b.cpp | Line 56, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1558] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_51b.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1559] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_51b.c | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1560] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_52c.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1561] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_52c.c | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1562] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_53d.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1563] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_53d.c | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1564] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_54e.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1565] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_54e.c | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1566] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_63b.c | Line 31, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1567] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_63b.c | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1568] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_64b.c | Line 34, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1569] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_64b.c | Line 55, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1570] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_65b.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1571] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_65b.c | Line 47, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1572] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_66b.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1573] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_66b.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1574] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_67b.c | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1575] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_67b.c | Line 54, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1576] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_68b.c | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1577] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_68b.c | Line 54, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1578] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1579] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_72b.cpp | Line 56, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1580] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1581] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_73b.cpp | Line 56, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1582] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1583] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_alloca_cpy_74b.cpp | Line 56, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1584] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_51b.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1585] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_51b.c | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1586] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_52c.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1587] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_52c.c | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1588] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_53d.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1589] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_53d.c | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1590] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_54e.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1591] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_54e.c | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1592] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_63b.c | Line 31, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1593] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_63b.c | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1594] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_64b.c | Line 34, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1595] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_64b.c | Line 55, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1596] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_65b.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1597] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_65b.c | Line 47, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1598] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_66b.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1599] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_66b.c | Line 50, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1600] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_67b.c | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1601] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_67b.c | Line 54, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1602] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_68b.c | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1603] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_68b.c | Line 54, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1604] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_72b.cpp | Line 38, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1605] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_72b.cpp | Line 56, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1606] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_73b.cpp | Line 38, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1607] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_73b.cpp | Line 56, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1608] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_74b.cpp | Line 38, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1609] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cat_74b.cpp | Line 56, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1610] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_51b.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1611] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_51b.c | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1612] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_52c.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1613] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_52c.c | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1614] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_53d.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1615] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_53d.c | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1616] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_54e.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1617] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_54e.c | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1618] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_63b.c | Line 31, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1619] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_63b.c | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1620] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_64b.c | Line 34, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1621] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_64b.c | Line 55, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1622] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_65b.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1623] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_65b.c | Line 47, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1624] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_66b.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1625] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_66b.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1626] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_67b.c | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1627] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_67b.c | Line 54, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1628] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_68b.c | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1629] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_68b.c | Line 54, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1630] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1631] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_72b.cpp | Line 56, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1632] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1633] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_73b.cpp | Line 56, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1634] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1635] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__dest_wchar_t_declare_cpy_74b.cpp | Line 56, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1636] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_51b.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1637] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_51b.c | Line 45, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1638] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_52c.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1639] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_52c.c | Line 45, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1640] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_53d.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1641] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_53d.c | Line 45, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1642] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_54e.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1643] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_54e.c | Line 45, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1644] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_63b.c | Line 29, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1645] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_63b.c | Line 45, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1646] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_64b.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1647] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_64b.c | Line 51, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1648] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_65b.c | Line 28, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1649] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_65b.c | Line 43, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1650] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_66b.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1651] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_66b.c | Line 46, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1652] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_67b.c | Line 34, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1653] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_67b.c | Line 50, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1654] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_68b.c | Line 34, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1655] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_68b.c | Line 50, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1656] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_72b.cpp | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1657] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_72b.cpp | Line 52, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1658] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_73b.cpp | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1659] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_73b.cpp | Line 52, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1660] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_74b.cpp | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1661] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cat_74b.cpp | Line 52, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1662] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_51b.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1663] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_51b.c | Line 45, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1664] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_52c.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1665] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_52c.c | Line 45, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1666] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_53d.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1667] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_53d.c | Line 45, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1668] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_54e.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1669] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_54e.c | Line 45, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1670] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_63b.c | Line 29, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1671] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_63b.c | Line 45, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1672] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_64b.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1673] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_64b.c | Line 51, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1674] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_65b.c | Line 28, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1675] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_65b.c | Line 43, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1676] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_66b.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1677] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_66b.c | Line 46, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1678] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_67b.c | Line 34, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1679] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_67b.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1680] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_68b.c | Line 34, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1681] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_68b.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1682] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1683] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_72b.cpp | Line 52, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1684] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1685] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_73b.cpp | Line 52, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1686] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1687] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_alloca_cpy_74b.cpp | Line 52, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1688] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_51b.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1689] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_51b.c | Line 45, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1690] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_52c.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1691] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_52c.c | Line 45, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1692] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_53d.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1693] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_53d.c | Line 45, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1694] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_54e.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1695] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_54e.c | Line 45, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1696] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_63b.c | Line 29, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1697] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_63b.c | Line 45, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1698] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_64b.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1699] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_64b.c | Line 51, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1700] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_65b.c | Line 28, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1701] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_65b.c | Line 43, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1702] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_66b.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1703] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_66b.c | Line 46, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1704] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_67b.c | Line 34, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1705] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_67b.c | Line 50, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1706] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_68b.c | Line 34, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1707] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_68b.c | Line 50, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1708] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_72b.cpp | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1709] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_72b.cpp | Line 52, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1710] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_73b.cpp | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1711] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_73b.cpp | Line 52, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1712] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_74b.cpp | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1713] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s08/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cat_74b.cpp | Line 52, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[1714] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_51b.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1715] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_51b.c | Line 45, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1716] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_52c.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1717] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_52c.c | Line 45, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1718] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_53d.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1719] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_53d.c | Line 45, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1720] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_54e.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1721] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_54e.c | Line 45, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1722] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_63b.c | Line 29, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1723] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_63b.c | Line 45, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1724] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_64b.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1725] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_64b.c | Line 51, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1726] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_65b.c | Line 28, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1727] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_65b.c | Line 43, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1728] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_66b.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1729] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_66b.c | Line 46, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1730] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_67b.c | Line 34, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1731] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_67b.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1732] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_68b.c | Line 34, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1733] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_68b.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1734] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1735] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_72b.cpp | Line 52, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1736] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1737] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_73b.cpp | Line 52, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1738] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1739] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_char_declare_cpy_74b.cpp | Line 52, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[1740] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_51b.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1741] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_51b.c | Line 45, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1742] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_52c.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1743] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_52c.c | Line 45, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1744] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_53d.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1745] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_53d.c | Line 45, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1746] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_54e.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1747] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_54e.c | Line 45, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1748] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_63b.c | Line 29, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1749] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_63b.c | Line 45, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1750] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_64b.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1751] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_64b.c | Line 51, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1752] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_65b.c | Line 28, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1753] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_65b.c | Line 43, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1754] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_66b.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1755] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_66b.c | Line 46, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1756] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_67b.c | Line 34, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1757] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_67b.c | Line 50, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1758] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_68b.c | Line 34, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1759] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_68b.c | Line 50, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1760] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_72b.cpp | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1761] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_72b.cpp | Line 52, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1762] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_73b.cpp | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1763] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_73b.cpp | Line 52, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1764] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_74b.cpp | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1765] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cat_74b.cpp | Line 52, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1766] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_51b.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1767] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_51b.c | Line 45, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1768] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_52c.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1769] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_52c.c | Line 45, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1770] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_53d.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1771] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_53d.c | Line 45, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1772] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_54e.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1773] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_54e.c | Line 45, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1774] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_63b.c | Line 29, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1775] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_63b.c | Line 45, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1776] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_64b.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1777] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_64b.c | Line 51, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1778] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_65b.c | Line 28, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1779] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_65b.c | Line 43, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1780] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_66b.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1781] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_66b.c | Line 46, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1782] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_67b.c | Line 34, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1783] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_67b.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1784] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_68b.c | Line 34, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1785] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_68b.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1786] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1787] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_72b.cpp | Line 52, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1788] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1789] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_73b.cpp | Line 52, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1790] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1791] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_alloca_cpy_74b.cpp | Line 52, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1792] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_51b.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1793] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_51b.c | Line 45, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1794] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_52c.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1795] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_52c.c | Line 45, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1796] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_53d.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1797] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_53d.c | Line 45, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1798] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_54e.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1799] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_54e.c | Line 45, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1800] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_63b.c | Line 29, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1801] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_63b.c | Line 45, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1802] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_64b.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1803] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_64b.c | Line 51, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1804] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_65b.c | Line 28, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1805] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_65b.c | Line 43, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1806] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_66b.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1807] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_66b.c | Line 46, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1808] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_67b.c | Line 34, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1809] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_67b.c | Line 50, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1810] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_68b.c | Line 34, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1811] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_68b.c | Line 50, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1812] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_72b.cpp | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1813] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_72b.cpp | Line 52, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1814] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_73b.cpp | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1815] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_73b.cpp | Line 52, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1816] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_74b.cpp | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1817] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cat_74b.cpp | Line 52, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1818] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_51b.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1819] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_51b.c | Line 45, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1820] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_52c.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1821] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_52c.c | Line 45, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1822] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_53d.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1823] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_53d.c | Line 45, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1824] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_54e.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1825] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_54e.c | Line 45, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1826] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_63b.c | Line 29, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1827] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_63b.c | Line 45, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1828] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_64b.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1829] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_64b.c | Line 51, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1830] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_65b.c | Line 28, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1831] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_65b.c | Line 43, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1832] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_66b.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1833] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_66b.c | Line 46, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1834] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_67b.c | Line 34, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1835] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_67b.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1836] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_68b.c | Line 34, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1837] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_68b.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1838] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1839] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_72b.cpp | Line 52, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1840] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1841] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_73b.cpp | Line 52, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1842] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1843] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE121_Stack_Based_Buffer_Overflow/s09/CWE121_Stack_Based_Buffer_Overflow__src_wchar_t_declare_cpy_74b.cpp | Line 52, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1844] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 35, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1845] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 39, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1846] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 45, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1847] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 49, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1848] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 83, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1849] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 87, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1850] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 92, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1851] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 96, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1852] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 115, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1853] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 119, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1854] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 124, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1855] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 128, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1856] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 147, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1857] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 151, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1858] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 157, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1859] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_22b.cpp | Line 161, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1860] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_51b.cpp | Line 51, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1861] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_51b.cpp | Line 55, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1862] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_51b.cpp | Line 61, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1863] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_51b.cpp | Line 65, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1864] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_51b.cpp | Line 85, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1865] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_51b.cpp | Line 89, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1866] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_51b.cpp | Line 95, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1867] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_51b.cpp | Line 99, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1868] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_51b.cpp | Line 115, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1869] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_51b.cpp | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1870] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_51b.cpp | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1871] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_51b.cpp | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1872] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_52c.cpp | Line 51, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1873] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_52c.cpp | Line 55, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1874] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_52c.cpp | Line 61, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1875] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_52c.cpp | Line 65, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1876] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_52c.cpp | Line 85, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1877] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_52c.cpp | Line 89, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1878] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_52c.cpp | Line 95, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1879] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_52c.cpp | Line 99, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1880] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_52c.cpp | Line 115, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1881] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_52c.cpp | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1882] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_52c.cpp | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1883] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_52c.cpp | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1884] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_53d.cpp | Line 51, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1885] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_53d.cpp | Line 55, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1886] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_53d.cpp | Line 61, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1887] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_53d.cpp | Line 65, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1888] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_53d.cpp | Line 85, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1889] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_53d.cpp | Line 89, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1890] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_53d.cpp | Line 95, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1891] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_53d.cpp | Line 99, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1892] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_53d.cpp | Line 115, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1893] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_53d.cpp | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1894] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_53d.cpp | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1895] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_53d.cpp | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1896] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_54e.cpp | Line 51, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1897] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_54e.cpp | Line 55, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1898] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_54e.cpp | Line 61, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1899] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_54e.cpp | Line 65, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1900] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_54e.cpp | Line 85, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1901] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_54e.cpp | Line 89, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1902] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_54e.cpp | Line 95, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1903] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_54e.cpp | Line 99, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1904] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_54e.cpp | Line 115, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1905] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_54e.cpp | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1906] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_54e.cpp | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1907] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_54e.cpp | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1908] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_61b.cpp | Line 91, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1909] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_61b.cpp | Line 166, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1910] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_62b.cpp | Line 91, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1911] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_62b.cpp | Line 164, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[1912] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_63b.cpp | Line 52, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1913] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_63b.cpp | Line 56, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1914] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_63b.cpp | Line 62, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1915] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_63b.cpp | Line 66, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1916] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_63b.cpp | Line 87, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1917] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_63b.cpp | Line 91, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1918] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_63b.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1919] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_63b.cpp | Line 101, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1920] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_63b.cpp | Line 118, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1921] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_63b.cpp | Line 122, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1922] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_63b.cpp | Line 127, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1923] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_63b.cpp | Line 131, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1924] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 50, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[1925] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 55, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1926] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 59, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1927] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 65, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1928] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 69, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1929] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 88, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[1930] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1931] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1932] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 103, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1933] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 107, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1934] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 122, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[1935] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 127, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1936] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 131, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1937] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 136, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1938] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_64b.cpp | Line 140, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1939] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_65b.cpp | Line 51, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1940] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_65b.cpp | Line 55, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1941] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_65b.cpp | Line 61, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1942] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_65b.cpp | Line 65, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1943] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_65b.cpp | Line 85, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1944] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_65b.cpp | Line 89, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1945] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_65b.cpp | Line 95, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1946] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_65b.cpp | Line 99, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1947] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_65b.cpp | Line 115, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1948] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_65b.cpp | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1949] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_65b.cpp | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1950] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_65b.cpp | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1951] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_66b.cpp | Line 53, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1952] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_66b.cpp | Line 57, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1953] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_66b.cpp | Line 63, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1954] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_66b.cpp | Line 67, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1955] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_66b.cpp | Line 88, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1956] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_66b.cpp | Line 92, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1957] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_66b.cpp | Line 98, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1958] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_66b.cpp | Line 102, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1959] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_66b.cpp | Line 119, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1960] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_66b.cpp | Line 123, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1961] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_66b.cpp | Line 128, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1962] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_66b.cpp | Line 132, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1963] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_67b.cpp | Line 57, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1964] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_67b.cpp | Line 61, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1965] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_67b.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1966] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_67b.cpp | Line 71, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1967] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_67b.cpp | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1968] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_67b.cpp | Line 96, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1969] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_67b.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1970] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_67b.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1971] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_67b.cpp | Line 123, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1972] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_67b.cpp | Line 127, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1973] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_67b.cpp | Line 132, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1974] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_67b.cpp | Line 136, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1975] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_68b.cpp | Line 56, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1976] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_68b.cpp | Line 60, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1977] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_68b.cpp | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1978] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_68b.cpp | Line 70, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1979] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_68b.cpp | Line 91, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1980] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_68b.cpp | Line 95, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1981] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_68b.cpp | Line 101, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1982] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_68b.cpp | Line 105, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1983] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_68b.cpp | Line 122, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1984] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_68b.cpp | Line 126, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1985] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_68b.cpp | Line 131, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1986] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_68b.cpp | Line 135, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1987] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_72b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1988] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_72b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1989] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_72b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1990] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_72b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1991] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_72b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1992] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_72b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1993] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_72b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1994] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_72b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1995] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_72b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[1996] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_72b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1997] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_72b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1998] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_72b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[1999] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_73b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2000] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_73b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2001] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_73b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2002] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_73b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2003] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_73b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2004] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_73b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2005] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_73b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2006] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_73b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2007] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_73b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2008] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_73b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2009] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_73b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2010] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_73b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2011] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_74b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2012] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_74b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2013] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_74b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2014] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_74b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2015] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_74b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2016] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_74b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2017] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_74b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2018] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_74b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2019] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_74b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2020] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_74b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2021] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_74b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2022] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_connect_socket_74b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2023] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 35, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2024] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 39, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2025] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 45, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2026] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 49, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2027] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 83, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2028] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 87, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2029] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 92, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2030] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 96, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2031] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 115, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2032] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 119, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2033] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 124, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2034] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 128, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2035] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 147, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2036] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 151, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2037] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 157, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2038] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_22b.cpp | Line 161, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2039] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_51b.cpp | Line 31, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2040] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_51b.cpp | Line 35, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2041] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_51b.cpp | Line 41, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2042] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_51b.cpp | Line 45, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2043] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_51b.cpp | Line 65, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2044] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_51b.cpp | Line 69, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2045] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_51b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2046] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_51b.cpp | Line 79, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2047] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_51b.cpp | Line 95, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2048] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_51b.cpp | Line 99, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2049] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_51b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2050] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_51b.cpp | Line 108, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2051] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_52c.cpp | Line 31, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2052] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_52c.cpp | Line 35, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2053] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_52c.cpp | Line 41, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2054] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_52c.cpp | Line 45, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2055] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_52c.cpp | Line 65, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2056] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_52c.cpp | Line 69, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2057] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_52c.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2058] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_52c.cpp | Line 79, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2059] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_52c.cpp | Line 95, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2060] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_52c.cpp | Line 99, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2061] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_52c.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2062] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_52c.cpp | Line 108, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2063] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_53d.cpp | Line 31, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2064] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_53d.cpp | Line 35, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2065] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_53d.cpp | Line 41, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2066] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_53d.cpp | Line 45, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2067] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_53d.cpp | Line 65, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2068] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_53d.cpp | Line 69, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2069] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_53d.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2070] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_53d.cpp | Line 79, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2071] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_53d.cpp | Line 95, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2072] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_53d.cpp | Line 99, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2073] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_53d.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2074] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_53d.cpp | Line 108, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2075] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_54e.cpp | Line 31, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2076] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_54e.cpp | Line 35, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2077] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_54e.cpp | Line 41, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2078] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_54e.cpp | Line 45, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2079] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_54e.cpp | Line 65, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2080] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_54e.cpp | Line 69, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2081] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_54e.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2082] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_54e.cpp | Line 79, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2083] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_54e.cpp | Line 95, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2084] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_54e.cpp | Line 99, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2085] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_54e.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2086] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_54e.cpp | Line 108, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2087] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_61b.cpp | Line 35, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2088] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_61b.cpp | Line 67, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2089] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_62b.cpp | Line 35, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2090] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_62b.cpp | Line 65, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2091] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_63b.cpp | Line 32, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2092] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_63b.cpp | Line 36, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2093] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_63b.cpp | Line 42, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2094] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_63b.cpp | Line 46, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2095] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_63b.cpp | Line 67, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2096] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_63b.cpp | Line 71, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2097] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_63b.cpp | Line 77, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2098] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_63b.cpp | Line 81, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2099] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_63b.cpp | Line 98, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2100] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_63b.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2101] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_63b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2102] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_63b.cpp | Line 111, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2103] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 30, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2104] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 35, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2105] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2106] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2107] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2108] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 68, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2109] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 73, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2110] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 77, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2111] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 83, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2112] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 87, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2113] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 102, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2114] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 107, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2115] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 111, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2116] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 116, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2117] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_64b.cpp | Line 120, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2118] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_65b.cpp | Line 31, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2119] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_65b.cpp | Line 35, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2120] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_65b.cpp | Line 41, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2121] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_65b.cpp | Line 45, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2122] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_65b.cpp | Line 65, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2123] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_65b.cpp | Line 69, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2124] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_65b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2125] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_65b.cpp | Line 79, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2126] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_65b.cpp | Line 95, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2127] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_65b.cpp | Line 99, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2128] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_65b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2129] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_65b.cpp | Line 108, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2130] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_66b.cpp | Line 33, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2131] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_66b.cpp | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2132] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_66b.cpp | Line 43, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2133] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_66b.cpp | Line 47, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2134] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_66b.cpp | Line 68, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2135] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_66b.cpp | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2136] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_66b.cpp | Line 78, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2137] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_66b.cpp | Line 82, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2138] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_66b.cpp | Line 99, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2139] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_66b.cpp | Line 103, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2140] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_66b.cpp | Line 108, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2141] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_66b.cpp | Line 112, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2142] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_67b.cpp | Line 37, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2143] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_67b.cpp | Line 41, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2144] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_67b.cpp | Line 47, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2145] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_67b.cpp | Line 51, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2146] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_67b.cpp | Line 72, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2147] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_67b.cpp | Line 76, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2148] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_67b.cpp | Line 82, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2149] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_67b.cpp | Line 86, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2150] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_67b.cpp | Line 103, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2151] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_67b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2152] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_67b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2153] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_67b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2154] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_68b.cpp | Line 36, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2155] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_68b.cpp | Line 40, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2156] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_68b.cpp | Line 46, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2157] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_68b.cpp | Line 50, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2158] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_68b.cpp | Line 71, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2159] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_68b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2160] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_68b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2161] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_68b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2162] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_68b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2163] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_68b.cpp | Line 106, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2164] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_68b.cpp | Line 111, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2165] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_68b.cpp | Line 115, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2166] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_72b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2167] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_72b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2168] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_72b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2169] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_72b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2170] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_72b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2171] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_72b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2172] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_72b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2173] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_72b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2174] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_72b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2175] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_72b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2176] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_72b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2177] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_72b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2178] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_73b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2179] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_73b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2180] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_73b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2181] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_73b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2182] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_73b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2183] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_73b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2184] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_73b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2185] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_73b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2186] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_73b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2187] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_73b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2188] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_73b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2189] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_73b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2190] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_74b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2191] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_74b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2192] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_74b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2193] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_74b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2194] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_74b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2195] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_74b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2196] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_74b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2197] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_74b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2198] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_74b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2199] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_74b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2200] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_74b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2201] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fgets_74b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2202] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 35, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2203] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 39, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2204] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 45, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2205] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 49, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2206] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 83, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2207] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 87, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2208] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 92, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2209] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 96, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2210] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 115, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2211] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 119, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2212] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 124, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2213] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 128, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2214] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 147, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2215] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 151, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2216] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 157, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2217] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_22b.cpp | Line 161, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2218] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_51b.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2219] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_51b.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2220] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_51b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2221] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_51b.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2222] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_51b.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2223] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_51b.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2224] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_51b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2225] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_51b.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2226] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_51b.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2227] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_51b.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2228] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_51b.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2229] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_51b.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2230] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_52c.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2231] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_52c.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2232] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_52c.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2233] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_52c.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2234] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_52c.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2235] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_52c.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2236] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_52c.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2237] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_52c.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2238] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_52c.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2239] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_52c.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2240] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_52c.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2241] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_52c.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2242] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_53d.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2243] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_53d.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2244] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_53d.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2245] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_53d.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2246] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_53d.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2247] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_53d.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2248] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_53d.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2249] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_53d.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2250] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_53d.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2251] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_53d.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2252] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_53d.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2253] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_53d.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2254] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_54e.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2255] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_54e.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2256] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_54e.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2257] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_54e.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2258] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_54e.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2259] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_54e.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2260] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_54e.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2261] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_54e.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2262] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_54e.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2263] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_54e.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2264] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_54e.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2265] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_54e.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2266] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_61b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2267] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_61b.cpp | Line 49, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2268] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2269] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_62b.cpp | Line 47, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2270] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_63b.cpp | Line 30, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2271] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_63b.cpp | Line 34, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2272] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_63b.cpp | Line 40, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2273] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_63b.cpp | Line 44, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2274] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_63b.cpp | Line 65, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2275] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_63b.cpp | Line 69, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2276] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_63b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2277] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_63b.cpp | Line 79, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2278] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_63b.cpp | Line 96, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2279] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_63b.cpp | Line 100, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2280] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_63b.cpp | Line 105, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2281] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_63b.cpp | Line 109, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2282] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 28, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2283] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 33, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2284] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2285] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 43, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2286] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 47, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2287] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 66, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2288] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 71, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2289] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2290] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2291] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2292] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 100, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2293] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 105, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2294] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2295] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 114, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2296] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_64b.cpp | Line 118, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2297] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_65b.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2298] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_65b.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2299] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_65b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2300] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_65b.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2301] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_65b.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2302] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_65b.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2303] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_65b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2304] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_65b.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2305] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_65b.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2306] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_65b.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2307] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_65b.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2308] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_65b.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2309] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_66b.cpp | Line 31, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2310] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_66b.cpp | Line 35, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2311] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_66b.cpp | Line 41, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2312] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_66b.cpp | Line 45, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2313] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_66b.cpp | Line 66, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2314] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_66b.cpp | Line 70, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2315] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_66b.cpp | Line 76, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2316] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_66b.cpp | Line 80, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2317] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_66b.cpp | Line 97, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2318] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_66b.cpp | Line 101, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2319] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_66b.cpp | Line 106, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2320] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_66b.cpp | Line 110, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2321] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_67b.cpp | Line 35, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2322] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_67b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2323] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_67b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2324] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_67b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2325] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_67b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2326] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_67b.cpp | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2327] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_67b.cpp | Line 80, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2328] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_67b.cpp | Line 84, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2329] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_67b.cpp | Line 101, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2330] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_67b.cpp | Line 105, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2331] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_67b.cpp | Line 110, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2332] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_67b.cpp | Line 114, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2333] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_68b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2334] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_68b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2335] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_68b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2336] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_68b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2337] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_68b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2338] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_68b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2339] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_68b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2340] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_68b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2341] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_68b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2342] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_68b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2343] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_68b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2344] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_68b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2345] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_72b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2346] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_72b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2347] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_72b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2348] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_72b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2349] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_72b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2350] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_72b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2351] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_72b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2352] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_72b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2353] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_72b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2354] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_72b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2355] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_72b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2356] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_72b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2357] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_73b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2358] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_73b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2359] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_73b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2360] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_73b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2361] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_73b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2362] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_73b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2363] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_73b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2364] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_73b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2365] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_73b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2366] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_73b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2367] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_73b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2368] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_73b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2369] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_74b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2370] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_74b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2371] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_74b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2372] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_74b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2373] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_74b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2374] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_74b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2375] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_74b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2376] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_74b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2377] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_74b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2378] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_74b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2379] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_74b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2380] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_fscanf_74b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2381] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 35, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2382] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 39, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2383] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 45, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2384] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 49, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2385] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 83, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2386] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 87, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2387] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 92, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2388] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 96, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2389] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 115, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2390] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 119, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2391] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 124, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2392] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 128, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2393] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 147, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2394] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 151, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2395] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 157, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2396] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_22b.cpp | Line 161, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2397] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_51b.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2398] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_51b.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2399] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_51b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2400] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_51b.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2401] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_51b.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2402] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_51b.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2403] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_51b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2404] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_51b.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2405] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_51b.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2406] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_51b.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2407] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_51b.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2408] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_51b.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2409] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_52c.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2410] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_52c.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2411] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_52c.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2412] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_52c.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2413] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_52c.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2414] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_52c.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2415] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_52c.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2416] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_52c.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2417] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_52c.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2418] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_52c.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2419] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_52c.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2420] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_52c.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2421] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_53d.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2422] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_53d.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2423] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_53d.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2424] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_53d.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2425] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_53d.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2426] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_53d.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2427] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_53d.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2428] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_53d.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2429] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_53d.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2430] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_53d.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2431] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_53d.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2432] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_53d.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2433] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_54e.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2434] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_54e.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2435] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_54e.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2436] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_54e.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2437] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_54e.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2438] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_54e.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2439] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_54e.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2440] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_54e.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2441] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_54e.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2442] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_54e.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2443] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_54e.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2444] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_54e.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2445] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_63b.cpp | Line 30, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2446] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_63b.cpp | Line 34, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2447] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_63b.cpp | Line 40, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2448] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_63b.cpp | Line 44, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2449] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_63b.cpp | Line 65, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2450] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_63b.cpp | Line 69, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2451] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_63b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2452] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_63b.cpp | Line 79, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2453] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_63b.cpp | Line 96, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2454] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_63b.cpp | Line 100, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2455] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_63b.cpp | Line 105, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2456] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_63b.cpp | Line 109, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2457] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 28, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2458] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 33, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2459] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2460] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 43, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2461] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 47, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2462] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 66, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2463] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 71, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2464] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2465] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2466] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2467] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 100, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2468] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 105, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2469] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2470] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 114, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2471] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_64b.cpp | Line 118, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2472] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_65b.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2473] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_65b.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2474] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_65b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2475] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_65b.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2476] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_65b.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2477] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_65b.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2478] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_65b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2479] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_65b.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2480] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_65b.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2481] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_65b.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2482] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_65b.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2483] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_65b.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2484] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_66b.cpp | Line 31, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2485] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_66b.cpp | Line 35, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2486] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_66b.cpp | Line 41, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2487] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_66b.cpp | Line 45, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2488] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_66b.cpp | Line 66, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2489] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_66b.cpp | Line 70, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2490] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_66b.cpp | Line 76, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2491] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_66b.cpp | Line 80, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2492] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_66b.cpp | Line 97, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2493] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_66b.cpp | Line 101, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2494] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_66b.cpp | Line 106, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2495] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_66b.cpp | Line 110, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2496] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_67b.cpp | Line 35, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2497] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_67b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2498] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_67b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2499] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_67b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2500] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_67b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2501] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_67b.cpp | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2502] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_67b.cpp | Line 80, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2503] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_67b.cpp | Line 84, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2504] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_67b.cpp | Line 101, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2505] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_67b.cpp | Line 105, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2506] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_67b.cpp | Line 110, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2507] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_67b.cpp | Line 114, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2508] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_68b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2509] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_68b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2510] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_68b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2511] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_68b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2512] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_68b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2513] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_68b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2514] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_68b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2515] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_68b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2516] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_68b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2517] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_68b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2518] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_68b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2519] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_68b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2520] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_72b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2521] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_72b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2522] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_72b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2523] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_72b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2524] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_72b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2525] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_72b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2526] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_72b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2527] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_72b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2528] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_72b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2529] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_72b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2530] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_72b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2531] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_72b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2532] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_73b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2533] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_73b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2534] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_73b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2535] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_73b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2536] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_73b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2537] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_73b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2538] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_73b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2539] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_73b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2540] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_73b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2541] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_73b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2542] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_73b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2543] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_73b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2544] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_74b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2545] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_74b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2546] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_74b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2547] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_74b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2548] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_74b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2549] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_74b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2550] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_74b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2551] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_74b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2552] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_74b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2553] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_74b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2554] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_74b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2555] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_large_74b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2556] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 35, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2557] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 39, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2558] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 45, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2559] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 49, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2560] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 83, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2561] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 87, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2562] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 92, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2563] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 96, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2564] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 115, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2565] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 119, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2566] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 124, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2567] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 128, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2568] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 147, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2569] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 151, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2570] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 157, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2571] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_22b.cpp | Line 161, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2572] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_51b.cpp | Line 51, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2573] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_51b.cpp | Line 55, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2574] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_51b.cpp | Line 61, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2575] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_51b.cpp | Line 65, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2576] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_51b.cpp | Line 85, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2577] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_51b.cpp | Line 89, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2578] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_51b.cpp | Line 95, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2579] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_51b.cpp | Line 99, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2580] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_51b.cpp | Line 115, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2581] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_51b.cpp | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2582] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_51b.cpp | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2583] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_51b.cpp | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2584] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_52c.cpp | Line 51, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2585] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_52c.cpp | Line 55, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2586] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_52c.cpp | Line 61, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2587] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_52c.cpp | Line 65, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2588] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_52c.cpp | Line 85, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2589] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_52c.cpp | Line 89, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2590] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_52c.cpp | Line 95, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2591] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_52c.cpp | Line 99, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2592] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_52c.cpp | Line 115, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2593] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_52c.cpp | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2594] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_52c.cpp | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2595] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_52c.cpp | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2596] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_53d.cpp | Line 51, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2597] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_53d.cpp | Line 55, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2598] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_53d.cpp | Line 61, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2599] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_53d.cpp | Line 65, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2600] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_53d.cpp | Line 85, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2601] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_53d.cpp | Line 89, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2602] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_53d.cpp | Line 95, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2603] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_53d.cpp | Line 99, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2604] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_53d.cpp | Line 115, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2605] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_53d.cpp | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2606] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_53d.cpp | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2607] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_53d.cpp | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2608] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_54e.cpp | Line 51, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2609] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_54e.cpp | Line 55, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2610] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_54e.cpp | Line 61, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2611] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_54e.cpp | Line 65, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2612] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_54e.cpp | Line 85, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2613] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_54e.cpp | Line 89, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2614] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_54e.cpp | Line 95, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2615] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_54e.cpp | Line 99, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2616] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_54e.cpp | Line 115, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2617] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_54e.cpp | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2618] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_54e.cpp | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2619] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_54e.cpp | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2620] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_63b.cpp | Line 52, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2621] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_63b.cpp | Line 56, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2622] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_63b.cpp | Line 62, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2623] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_63b.cpp | Line 66, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2624] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_63b.cpp | Line 87, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2625] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_63b.cpp | Line 91, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2626] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_63b.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2627] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_63b.cpp | Line 101, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2628] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_63b.cpp | Line 118, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2629] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_63b.cpp | Line 122, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2630] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_63b.cpp | Line 127, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2631] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_63b.cpp | Line 131, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2632] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 50, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2633] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 55, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2634] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 59, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2635] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 65, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2636] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 69, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2637] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 88, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2638] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2639] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2640] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 103, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2641] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 107, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2642] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 122, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2643] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 127, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2644] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 131, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2645] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 136, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2646] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_64b.cpp | Line 140, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2647] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_65b.cpp | Line 51, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2648] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_65b.cpp | Line 55, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2649] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_65b.cpp | Line 61, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2650] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_65b.cpp | Line 65, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2651] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_65b.cpp | Line 85, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2652] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_65b.cpp | Line 89, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2653] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_65b.cpp | Line 95, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2654] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_65b.cpp | Line 99, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2655] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_65b.cpp | Line 115, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2656] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_65b.cpp | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2657] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_65b.cpp | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2658] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_65b.cpp | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2659] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_66b.cpp | Line 53, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2660] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_66b.cpp | Line 57, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2661] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_66b.cpp | Line 63, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2662] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_66b.cpp | Line 67, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2663] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_66b.cpp | Line 88, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2664] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_66b.cpp | Line 92, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2665] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_66b.cpp | Line 98, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2666] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_66b.cpp | Line 102, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2667] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_66b.cpp | Line 119, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2668] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_66b.cpp | Line 123, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2669] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_66b.cpp | Line 128, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2670] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_66b.cpp | Line 132, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2671] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_67b.cpp | Line 57, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2672] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_67b.cpp | Line 61, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2673] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_67b.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2674] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_67b.cpp | Line 71, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2675] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_67b.cpp | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2676] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_67b.cpp | Line 96, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2677] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_67b.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2678] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_67b.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2679] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_67b.cpp | Line 123, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2680] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_67b.cpp | Line 127, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2681] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_67b.cpp | Line 132, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2682] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_67b.cpp | Line 136, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2683] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_68b.cpp | Line 56, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2684] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_68b.cpp | Line 60, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2685] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_68b.cpp | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2686] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_68b.cpp | Line 70, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2687] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_68b.cpp | Line 91, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2688] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_68b.cpp | Line 95, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2689] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_68b.cpp | Line 101, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2690] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_68b.cpp | Line 105, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2691] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_68b.cpp | Line 122, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2692] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_68b.cpp | Line 126, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2693] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_68b.cpp | Line 131, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2694] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_68b.cpp | Line 135, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2695] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_72b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2696] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_72b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2697] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_72b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2698] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_72b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2699] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_72b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2700] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_72b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2701] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_72b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2702] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_72b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2703] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_72b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2704] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_72b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2705] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_72b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2706] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_72b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2707] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_73b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2708] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_73b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2709] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_73b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2710] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_73b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2711] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_73b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2712] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_73b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2713] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_73b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2714] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_73b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2715] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_73b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2716] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_73b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2717] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_73b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2718] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_73b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2719] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_74b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2720] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_74b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2721] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_74b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2722] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_74b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2723] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_74b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2724] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_74b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2725] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_74b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2726] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_74b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2727] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_74b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2728] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_74b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2729] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_74b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2730] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_listen_socket_74b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2731] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 35, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2732] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 39, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2733] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 45, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2734] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 49, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2735] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 83, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2736] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 87, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2737] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 92, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2738] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 96, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2739] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 115, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2740] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 119, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2741] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 124, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2742] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 128, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2743] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 147, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2744] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 151, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2745] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 157, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2746] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_22b.cpp | Line 161, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2747] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_51b.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2748] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_51b.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2749] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_51b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2750] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_51b.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2751] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_51b.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2752] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_51b.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2753] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_51b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2754] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_51b.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2755] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_51b.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2756] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_51b.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2757] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_51b.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2758] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_51b.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2759] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_52c.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2760] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_52c.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2761] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_52c.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2762] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_52c.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2763] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_52c.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2764] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_52c.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2765] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_52c.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2766] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_52c.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2767] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_52c.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2768] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_52c.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2769] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_52c.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2770] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_52c.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2771] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_53d.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2772] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_53d.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2773] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_53d.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2774] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_53d.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2775] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_53d.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2776] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_53d.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2777] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_53d.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2778] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_53d.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2779] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_53d.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2780] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_53d.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2781] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_53d.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2782] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_53d.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2783] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_54e.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2784] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_54e.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2785] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_54e.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2786] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_54e.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2787] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_54e.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2788] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_54e.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2789] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_54e.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2790] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_54e.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2791] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_54e.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2792] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_54e.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2793] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_54e.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2794] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_54e.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2795] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_63b.cpp | Line 30, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2796] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_63b.cpp | Line 34, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2797] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_63b.cpp | Line 40, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2798] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_63b.cpp | Line 44, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2799] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_63b.cpp | Line 65, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2800] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_63b.cpp | Line 69, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2801] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_63b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2802] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_63b.cpp | Line 79, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2803] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_63b.cpp | Line 96, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2804] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_63b.cpp | Line 100, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2805] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_63b.cpp | Line 105, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2806] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_63b.cpp | Line 109, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2807] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 28, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2808] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 33, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2809] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2810] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 43, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2811] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 47, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2812] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 66, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2813] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 71, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2814] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2815] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2816] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2817] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 100, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[2818] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 105, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2819] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2820] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 114, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2821] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_64b.cpp | Line 118, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2822] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_65b.cpp | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2823] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_65b.cpp | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2824] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_65b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2825] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_65b.cpp | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2826] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_65b.cpp | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2827] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_65b.cpp | Line 67, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2828] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_65b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2829] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_65b.cpp | Line 77, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2830] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_65b.cpp | Line 93, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2831] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_65b.cpp | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2832] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_65b.cpp | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2833] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_65b.cpp | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2834] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_66b.cpp | Line 31, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2835] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_66b.cpp | Line 35, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2836] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_66b.cpp | Line 41, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2837] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_66b.cpp | Line 45, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2838] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_66b.cpp | Line 66, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2839] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_66b.cpp | Line 70, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2840] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_66b.cpp | Line 76, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2841] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_66b.cpp | Line 80, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2842] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_66b.cpp | Line 97, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2843] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_66b.cpp | Line 101, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2844] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_66b.cpp | Line 106, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2845] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_66b.cpp | Line 110, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2846] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_67b.cpp | Line 35, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2847] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_67b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2848] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_67b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2849] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_67b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2850] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_67b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2851] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_67b.cpp | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2852] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_67b.cpp | Line 80, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2853] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_67b.cpp | Line 84, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2854] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_67b.cpp | Line 101, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2855] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_67b.cpp | Line 105, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2856] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_67b.cpp | Line 110, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2857] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_67b.cpp | Line 114, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2858] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_68b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2859] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_68b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2860] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_68b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2861] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_68b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2862] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_68b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2863] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_68b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2864] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_68b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2865] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_68b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2866] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_68b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2867] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_68b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2868] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_68b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2869] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_68b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2870] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_72b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2871] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_72b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2872] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_72b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2873] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_72b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2874] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_72b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2875] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_72b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2876] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_72b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2877] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_72b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2878] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_72b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2879] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_72b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2880] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_72b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2881] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_72b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2882] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_73b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2883] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_73b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2884] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_73b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2885] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_73b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2886] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_73b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2887] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_73b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2888] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_73b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2889] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_73b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2890] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_73b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2891] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_73b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2892] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_73b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2893] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_73b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2894] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_74b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2895] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_74b.cpp | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2896] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_74b.cpp | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2897] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_74b.cpp | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2898] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_74b.cpp | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2899] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_74b.cpp | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2900] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_74b.cpp | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2901] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_74b.cpp | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2902] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_74b.cpp | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[2903] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_74b.cpp | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2904] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_74b.cpp | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2905] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE129_rand_74b.cpp | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[2906] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_51b.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2907] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_51b.cpp | Line 54, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2908] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_52c.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2909] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_52c.cpp | Line 54, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2910] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_53d.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2911] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_53d.cpp | Line 54, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2912] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_54e.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2913] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_54e.cpp | Line 54, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2914] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_63b.cpp | Line 37, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2915] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_63b.cpp | Line 54, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2916] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_64b.cpp | Line 40, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2917] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_64b.cpp | Line 60, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2918] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_65b.cpp | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2919] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_65b.cpp | Line 52, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2920] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_66b.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2921] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_66b.cpp | Line 55, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2922] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_67b.cpp | Line 42, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2923] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_67b.cpp | Line 59, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2924] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_68b.cpp | Line 42, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2925] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_68b.cpp | Line 59, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2926] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_72b.cpp | Line 41, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2927] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_72b.cpp | Line 58, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2928] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_73b.cpp | Line 41, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2929] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_73b.cpp | Line 58, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2930] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_74b.cpp | Line 41, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2931] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_cpy_74b.cpp | Line 58, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[2932] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_51b.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2933] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_51b.cpp | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2934] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_52c.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2935] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_52c.cpp | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2936] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_53d.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2937] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_53d.cpp | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2938] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_54e.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2939] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_54e.cpp | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2940] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_63b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2941] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_63b.cpp | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2942] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_64b.cpp | Line 41, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2943] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_64b.cpp | Line 62, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2944] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_65b.cpp | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2945] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_65b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2946] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_66b.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2947] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_66b.cpp | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2948] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_67b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2949] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_67b.cpp | Line 61, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2950] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_68b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2951] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_68b.cpp | Line 61, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2952] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_72b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2953] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_72b.cpp | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2954] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_73b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2955] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_73b.cpp | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2956] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_74b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2957] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memcpy_74b.cpp | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2958] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_51b.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2959] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_51b.cpp | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2960] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_52c.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2961] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_52c.cpp | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2962] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_53d.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2963] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_53d.cpp | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2964] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_54e.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2965] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_54e.cpp | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2966] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_63b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2967] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_63b.cpp | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2968] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_64b.cpp | Line 41, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2969] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_64b.cpp | Line 62, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2970] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_65b.cpp | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2971] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_65b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2972] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_66b.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2973] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_66b.cpp | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2974] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_67b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2975] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_67b.cpp | Line 61, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2976] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_68b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2977] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_68b.cpp | Line 61, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2978] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_72b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2979] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_72b.cpp | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2980] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_73b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2981] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_73b.cpp | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2982] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_74b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2983] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_memmove_74b.cpp | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2984] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_51b.cpp | Line 39, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2985] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_51b.cpp | Line 56, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2986] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_52c.cpp | Line 39, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2987] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_52c.cpp | Line 56, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2988] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_53d.cpp | Line 39, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2989] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_53d.cpp | Line 56, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2990] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_54e.cpp | Line 39, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2991] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_54e.cpp | Line 56, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2992] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_63b.cpp | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2993] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_63b.cpp | Line 56, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2994] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_64b.cpp | Line 41, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2995] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_64b.cpp | Line 62, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2996] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_65b.cpp | Line 37, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2997] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_65b.cpp | Line 54, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2998] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_66b.cpp | Line 39, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[2999] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_66b.cpp | Line 57, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3000] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_67b.cpp | Line 43, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3001] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_67b.cpp | Line 61, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3002] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_68b.cpp | Line 43, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3003] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_68b.cpp | Line 61, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3004] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_72b.cpp | Line 42, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3005] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_72b.cpp | Line 60, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3006] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_73b.cpp | Line 42, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3007] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_73b.cpp | Line 60, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3008] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_74b.cpp | Line 42, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3009] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s01/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_char_ncpy_74b.cpp | Line 60, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3010] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_51b.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3011] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_51b.cpp | Line 54, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3012] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_52c.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3013] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_52c.cpp | Line 54, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3014] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_53d.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3015] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_53d.cpp | Line 54, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3016] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_54e.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3017] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_54e.cpp | Line 54, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3018] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_63b.cpp | Line 37, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3019] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_63b.cpp | Line 54, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3020] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_64b.cpp | Line 40, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3021] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_64b.cpp | Line 60, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3022] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_65b.cpp | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3023] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_65b.cpp | Line 52, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3024] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_66b.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3025] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_66b.cpp | Line 55, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3026] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_67b.cpp | Line 42, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3027] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_67b.cpp | Line 59, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3028] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_68b.cpp | Line 42, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3029] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_68b.cpp | Line 59, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3030] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_72b.cpp | Line 41, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3031] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_72b.cpp | Line 58, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3032] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_73b.cpp | Line 41, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3033] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_73b.cpp | Line 58, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3034] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_74b.cpp | Line 41, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3035] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_cpy_74b.cpp | Line 58, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3036] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_51b.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3037] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_51b.cpp | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3038] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_52c.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3039] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_52c.cpp | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3040] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_53d.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3041] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_53d.cpp | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3042] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_54e.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3043] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_54e.cpp | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3044] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_63b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3045] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_63b.cpp | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3046] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_64b.cpp | Line 41, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3047] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_64b.cpp | Line 62, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3048] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_65b.cpp | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3049] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_65b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3050] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_66b.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3051] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_66b.cpp | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3052] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_67b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3053] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_67b.cpp | Line 61, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3054] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_68b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3055] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_68b.cpp | Line 61, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3056] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_72b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3057] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_72b.cpp | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3058] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_73b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3059] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_73b.cpp | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3060] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_74b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3061] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memcpy_74b.cpp | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3062] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_51b.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3063] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_51b.cpp | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3064] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_52c.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3065] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_52c.cpp | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3066] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_53d.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3067] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_53d.cpp | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3068] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_54e.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3069] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_54e.cpp | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3070] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_63b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3071] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_63b.cpp | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3072] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_64b.cpp | Line 41, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3073] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_64b.cpp | Line 62, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3074] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_65b.cpp | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3075] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_65b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3076] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_66b.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3077] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_66b.cpp | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3078] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_67b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3079] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_67b.cpp | Line 61, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3080] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_68b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3081] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_68b.cpp | Line 61, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3082] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_72b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3083] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_72b.cpp | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3084] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_73b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3085] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_73b.cpp | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3086] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_74b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3087] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE193_wchar_t_memmove_74b.cpp | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3088] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_51b.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3089] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_51b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3090] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_52c.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3091] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_52c.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3092] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_53d.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3093] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_53d.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3094] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_54e.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3095] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_54e.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3096] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_63b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3097] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_63b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3098] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_64b.cpp | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3099] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_64b.cpp | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3100] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_65b.cpp | Line 33, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3101] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_65b.cpp | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3102] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_66b.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3103] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_66b.cpp | Line 55, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3104] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_67b.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3105] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_67b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3106] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_68b.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3107] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_68b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3108] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3109] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_72b.cpp | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3110] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3111] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_73b.cpp | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3112] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3113] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memcpy_74b.cpp | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3114] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_51b.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3115] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_51b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3116] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_52c.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3117] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_52c.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3118] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_53d.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3119] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_53d.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3120] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_54e.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3121] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_54e.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3122] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_63b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3123] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_63b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3124] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_64b.cpp | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3125] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_64b.cpp | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3126] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_65b.cpp | Line 33, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3127] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_65b.cpp | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3128] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_66b.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3129] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_66b.cpp | Line 55, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3130] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_67b.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3131] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_67b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3132] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_68b.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3133] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_68b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3134] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_72b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3135] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_72b.cpp | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3136] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_73b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3137] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_73b.cpp | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3138] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_74b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3139] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_memmove_74b.cpp | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3140] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_51b.cpp | Line 35, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3141] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_51b.cpp | Line 53, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3142] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_52c.cpp | Line 35, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3143] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_52c.cpp | Line 53, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3144] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_53d.cpp | Line 35, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3145] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_53d.cpp | Line 53, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3146] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_54e.cpp | Line 35, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3147] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_54e.cpp | Line 53, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3148] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_63b.cpp | Line 34, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3149] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_63b.cpp | Line 53, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3150] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_64b.cpp | Line 37, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3151] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_64b.cpp | Line 59, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3152] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_65b.cpp | Line 33, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3153] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_65b.cpp | Line 51, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3154] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_66b.cpp | Line 35, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3155] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_66b.cpp | Line 54, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3156] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_67b.cpp | Line 39, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3157] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_67b.cpp | Line 58, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3158] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_68b.cpp | Line 39, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3159] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_68b.cpp | Line 58, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3160] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_72b.cpp | Line 38, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3161] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_72b.cpp | Line 57, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3162] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_73b.cpp | Line 38, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3163] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_73b.cpp | Line 57, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3164] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_74b.cpp | Line 38, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3165] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncat_74b.cpp | Line 57, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3166] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_51b.cpp | Line 35, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3167] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_51b.cpp | Line 54, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3168] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_52c.cpp | Line 35, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3169] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_52c.cpp | Line 54, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3170] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_53d.cpp | Line 35, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3171] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_53d.cpp | Line 54, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3172] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_54e.cpp | Line 35, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3173] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_54e.cpp | Line 54, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3174] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_63b.cpp | Line 34, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3175] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_63b.cpp | Line 54, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3176] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_64b.cpp | Line 37, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3177] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_64b.cpp | Line 60, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3178] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_65b.cpp | Line 33, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3179] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_65b.cpp | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3180] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_66b.cpp | Line 35, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3181] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_66b.cpp | Line 55, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3182] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_67b.cpp | Line 39, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3183] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_67b.cpp | Line 59, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3184] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_68b.cpp | Line 39, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3185] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_68b.cpp | Line 59, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3186] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3187] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_72b.cpp | Line 58, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3188] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3189] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_73b.cpp | Line 58, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3190] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3191] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s02/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_char_ncpy_74b.cpp | Line 58, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3192] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_51b.cpp | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3193] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_51b.cpp | Line 65, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3194] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_52c.cpp | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3195] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_52c.cpp | Line 65, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3196] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_53d.cpp | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3197] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_53d.cpp | Line 65, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3198] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_54e.cpp | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3199] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_54e.cpp | Line 65, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3200] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_63b.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3201] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_63b.cpp | Line 65, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3202] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_64b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3203] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_64b.cpp | Line 71, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3204] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_65b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3205] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_65b.cpp | Line 63, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3206] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_66b.cpp | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3207] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_66b.cpp | Line 66, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3208] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_67b.cpp | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3209] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_67b.cpp | Line 70, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3210] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_68b.cpp | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3211] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_68b.cpp | Line 70, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3212] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_72b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3213] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_72b.cpp | Line 69, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3214] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_73b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3215] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_73b.cpp | Line 69, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3216] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_74b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3217] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memcpy_74b.cpp | Line 69, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3218] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_51b.cpp | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3219] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_51b.cpp | Line 65, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3220] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_52c.cpp | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3221] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_52c.cpp | Line 65, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3222] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_53d.cpp | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3223] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_53d.cpp | Line 65, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3224] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_54e.cpp | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3225] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_54e.cpp | Line 65, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3226] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_63b.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3227] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_63b.cpp | Line 65, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3228] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_64b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3229] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_64b.cpp | Line 71, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3230] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_65b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3231] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_65b.cpp | Line 63, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3232] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_66b.cpp | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3233] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_66b.cpp | Line 66, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3234] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_67b.cpp | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3235] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_67b.cpp | Line 70, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3236] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_68b.cpp | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3237] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_68b.cpp | Line 70, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3238] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_72b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3239] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_72b.cpp | Line 69, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3240] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_73b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3241] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_73b.cpp | Line 69, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3242] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_74b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3243] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_class_memmove_74b.cpp | Line 69, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3244] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_51b.cpp | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3245] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_51b.cpp | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3246] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_52c.cpp | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3247] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_52c.cpp | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3248] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_53d.cpp | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3249] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_53d.cpp | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3250] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_54e.cpp | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3251] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_54e.cpp | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3252] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_63b.cpp | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3253] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_63b.cpp | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3254] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_64b.cpp | Line 33, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3255] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_64b.cpp | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3256] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_65b.cpp | Line 29, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3257] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_65b.cpp | Line 45, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3258] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_66b.cpp | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3259] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_66b.cpp | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3260] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_67b.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3261] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_67b.cpp | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3262] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_68b.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3263] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_68b.cpp | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3264] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_72b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3265] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_72b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3266] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_73b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3267] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_73b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3268] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_74b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3269] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memcpy_74b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3270] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_51b.cpp | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3271] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_51b.cpp | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3272] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_52c.cpp | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3273] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_52c.cpp | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3274] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_53d.cpp | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3275] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_53d.cpp | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3276] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_54e.cpp | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3277] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_54e.cpp | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3278] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_63b.cpp | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3279] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_63b.cpp | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3280] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_64b.cpp | Line 33, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3281] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_64b.cpp | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3282] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_65b.cpp | Line 29, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3283] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_65b.cpp | Line 45, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3284] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_66b.cpp | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3285] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_66b.cpp | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3286] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_67b.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3287] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_67b.cpp | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3288] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_68b.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3289] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_68b.cpp | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3290] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_72b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3291] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_72b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3292] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_73b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3293] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_73b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3294] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_74b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3295] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int64_t_memmove_74b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3296] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_51b.cpp | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3297] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_51b.cpp | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3298] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_52c.cpp | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3299] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_52c.cpp | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3300] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_53d.cpp | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3301] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_53d.cpp | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3302] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_54e.cpp | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3303] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_54e.cpp | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3304] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_63b.cpp | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3305] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_63b.cpp | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3306] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_64b.cpp | Line 33, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3307] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_64b.cpp | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3308] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_65b.cpp | Line 29, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3309] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_65b.cpp | Line 45, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3310] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_66b.cpp | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3311] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_66b.cpp | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3312] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_67b.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3313] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_67b.cpp | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3314] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_68b.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3315] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_68b.cpp | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3316] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_72b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3317] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_72b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3318] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_73b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3319] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_73b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3320] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_74b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3321] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memcpy_74b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3322] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_51b.cpp | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3323] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_51b.cpp | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3324] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_52c.cpp | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3325] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_52c.cpp | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3326] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_53d.cpp | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3327] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_53d.cpp | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3328] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_54e.cpp | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3329] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_54e.cpp | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3330] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_63b.cpp | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3331] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_63b.cpp | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3332] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_64b.cpp | Line 33, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3333] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_64b.cpp | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3334] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_65b.cpp | Line 29, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3335] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_65b.cpp | Line 45, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3336] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_66b.cpp | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3337] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_66b.cpp | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3338] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_67b.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3339] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_67b.cpp | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3340] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_68b.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3341] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_68b.cpp | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3342] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_72b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3343] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_72b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3344] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_73b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3345] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_73b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3346] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_74b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3347] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_int_memmove_74b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3348] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_51b.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3349] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_51b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3350] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_52c.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3351] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_52c.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3352] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_53d.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3353] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_53d.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3354] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_54e.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3355] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_54e.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3356] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_63b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3357] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_63b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3358] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_64b.cpp | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3359] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_64b.cpp | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3360] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_65b.cpp | Line 33, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3361] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_65b.cpp | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3362] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_66b.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3363] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_66b.cpp | Line 55, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3364] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_67b.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3365] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_67b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3366] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_68b.cpp | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3367] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_68b.cpp | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3368] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3369] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_72b.cpp | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3370] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3371] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_73b.cpp | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3372] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3373] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memcpy_74b.cpp | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3374] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_51b.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3375] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_51b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3376] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_52c.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3377] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_52c.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3378] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_53d.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3379] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_53d.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3380] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_54e.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3381] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_54e.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3382] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_63b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3383] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_63b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3384] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_64b.cpp | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3385] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_64b.cpp | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3386] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_65b.cpp | Line 33, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3387] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_65b.cpp | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3388] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_66b.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3389] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_66b.cpp | Line 55, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3390] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_67b.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3391] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_67b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3392] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_68b.cpp | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3393] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_68b.cpp | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3394] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_72b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3395] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_72b.cpp | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3396] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_73b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3397] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_73b.cpp | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3398] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_74b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3399] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s03/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE805_wchar_t_memmove_74b.cpp | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3400] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_51b.cpp | Line 33, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3401] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_51b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3402] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_52c.cpp | Line 33, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3403] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_52c.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3404] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_53d.cpp | Line 33, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3405] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_53d.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3406] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_54e.cpp | Line 33, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3407] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_54e.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3408] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_63b.cpp | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3409] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_63b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3410] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_64b.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3411] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_64b.cpp | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3412] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_65b.cpp | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3413] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_65b.cpp | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3414] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_66b.cpp | Line 33, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3415] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_66b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3416] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_67b.cpp | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3417] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_67b.cpp | Line 55, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3418] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_68b.cpp | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3419] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_68b.cpp | Line 55, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3420] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3421] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_72b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3422] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3423] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_73b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3424] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3425] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memcpy_74b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3426] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_51b.cpp | Line 33, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3427] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_51b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3428] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_52c.cpp | Line 33, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3429] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_52c.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3430] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_53d.cpp | Line 33, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3431] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_53d.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3432] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_54e.cpp | Line 33, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3433] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_54e.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3434] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_63b.cpp | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3435] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_63b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3436] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_64b.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3437] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_64b.cpp | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3438] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_65b.cpp | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3439] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_65b.cpp | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3440] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_66b.cpp | Line 33, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3441] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_66b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3442] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_67b.cpp | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3443] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_67b.cpp | Line 55, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3444] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_68b.cpp | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3445] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_68b.cpp | Line 55, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3446] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_72b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3447] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_72b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3448] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_73b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3449] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_73b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3450] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_74b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3451] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_memmove_74b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3452] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_51b.cpp | Line 33, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3453] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_51b.cpp | Line 50, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3454] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_52c.cpp | Line 33, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3455] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_52c.cpp | Line 50, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3456] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_53d.cpp | Line 33, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3457] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_53d.cpp | Line 50, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3458] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_54e.cpp | Line 33, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3459] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_54e.cpp | Line 50, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3460] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_63b.cpp | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3461] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_63b.cpp | Line 50, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3462] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_64b.cpp | Line 35, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3463] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_64b.cpp | Line 56, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3464] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_65b.cpp | Line 31, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3465] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_65b.cpp | Line 48, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3466] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_66b.cpp | Line 33, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3467] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_66b.cpp | Line 51, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3468] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_67b.cpp | Line 37, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3469] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_67b.cpp | Line 55, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3470] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_68b.cpp | Line 37, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3471] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_68b.cpp | Line 55, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3472] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_72b.cpp | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3473] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_72b.cpp | Line 54, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3474] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_73b.cpp | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3475] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_73b.cpp | Line 54, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3476] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_74b.cpp | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3477] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncat_74b.cpp | Line 54, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3478] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_51b.cpp | Line 33, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3479] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_51b.cpp | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3480] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_52c.cpp | Line 33, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3481] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_52c.cpp | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3482] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_53d.cpp | Line 33, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3483] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_53d.cpp | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3484] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_54e.cpp | Line 33, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3485] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_54e.cpp | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3486] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_63b.cpp | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3487] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_63b.cpp | Line 50, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3488] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_64b.cpp | Line 35, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3489] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_64b.cpp | Line 56, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3490] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_65b.cpp | Line 31, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3491] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_65b.cpp | Line 48, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3492] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_66b.cpp | Line 33, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3493] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_66b.cpp | Line 51, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3494] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_67b.cpp | Line 37, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3495] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_67b.cpp | Line 55, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3496] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_68b.cpp | Line 37, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3497] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_68b.cpp | Line 55, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3498] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3499] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_72b.cpp | Line 54, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3500] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3501] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_73b.cpp | Line 54, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3502] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3503] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_char_ncpy_74b.cpp | Line 54, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3504] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_51b.cpp | Line 33, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3505] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_51b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3506] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_52c.cpp | Line 33, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3507] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_52c.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3508] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_53d.cpp | Line 33, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3509] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_53d.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3510] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_54e.cpp | Line 33, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3511] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_54e.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3512] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_63b.cpp | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3513] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_63b.cpp | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3514] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_64b.cpp | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3515] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_64b.cpp | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3516] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_65b.cpp | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3517] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_65b.cpp | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3518] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_66b.cpp | Line 33, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3519] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_66b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3520] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_67b.cpp | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3521] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_67b.cpp | Line 55, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3522] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_68b.cpp | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3523] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_68b.cpp | Line 55, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3524] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3525] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_72b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3526] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3527] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_73b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3528] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3529] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memcpy_74b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3530] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_51b.cpp | Line 33, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3531] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_51b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3532] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_52c.cpp | Line 33, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3533] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_52c.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3534] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_53d.cpp | Line 33, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3535] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_53d.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3536] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_54e.cpp | Line 33, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3537] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_54e.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3538] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_63b.cpp | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3539] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_63b.cpp | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3540] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_64b.cpp | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3541] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_64b.cpp | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3542] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_65b.cpp | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3543] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_65b.cpp | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3544] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_66b.cpp | Line 33, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3545] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_66b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3546] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_67b.cpp | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3547] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_67b.cpp | Line 55, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3548] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_68b.cpp | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3549] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_68b.cpp | Line 55, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3550] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_72b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3551] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_72b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3552] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_73b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3553] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_73b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3554] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_74b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3555] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s04/CWE122_Heap_Based_Buffer_Overflow__cpp_CWE806_wchar_t_memmove_74b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3556] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_51b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3557] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_51b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3558] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_52c.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3559] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_52c.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3560] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_53d.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3561] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_53d.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3562] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_54e.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3563] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_54e.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3564] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_63b.c | Line 27, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3565] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_63b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3566] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_64b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3567] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_64b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3568] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_65b.c | Line 26, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3569] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_65b.c | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3570] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_66b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3571] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_66b.c | Line 45, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3572] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_67b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3573] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_67b.c | Line 49, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3574] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_68b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3575] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_68b.c | Line 49, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3576] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_72b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3577] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_72b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3578] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_73b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3579] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_73b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3580] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_74b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3581] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__CWE131_memcpy_74b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3582] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_51b.cpp | Line 35, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3583] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_51b.cpp | Line 53, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3584] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_52c.cpp | Line 35, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3585] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_52c.cpp | Line 53, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3586] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_53d.cpp | Line 35, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3587] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_53d.cpp | Line 53, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3588] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_54e.cpp | Line 35, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3589] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_54e.cpp | Line 53, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3590] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_63b.cpp | Line 34, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3591] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_63b.cpp | Line 53, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3592] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_64b.cpp | Line 37, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3593] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_64b.cpp | Line 59, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3594] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_65b.cpp | Line 33, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3595] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_65b.cpp | Line 51, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3596] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_66b.cpp | Line 35, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3597] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_66b.cpp | Line 54, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3598] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_67b.cpp | Line 39, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3599] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_67b.cpp | Line 58, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3600] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_68b.cpp | Line 39, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3601] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_68b.cpp | Line 58, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3602] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_72b.cpp | Line 38, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3603] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_72b.cpp | Line 57, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3604] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_73b.cpp | Line 38, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3605] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_73b.cpp | Line 57, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3606] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_74b.cpp | Line 38, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3607] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cat_74b.cpp | Line 57, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3608] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_51b.cpp | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3609] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_51b.cpp | Line 53, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3610] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_52c.cpp | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3611] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_52c.cpp | Line 53, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3612] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_53d.cpp | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3613] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_53d.cpp | Line 53, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3614] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_54e.cpp | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3615] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_54e.cpp | Line 53, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3616] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_63b.cpp | Line 34, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3617] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_63b.cpp | Line 53, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3618] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_64b.cpp | Line 37, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3619] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_64b.cpp | Line 59, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3620] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_65b.cpp | Line 33, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3621] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_65b.cpp | Line 51, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3622] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_66b.cpp | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3623] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_66b.cpp | Line 54, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3624] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_67b.cpp | Line 39, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3625] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_67b.cpp | Line 58, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3626] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_68b.cpp | Line 39, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3627] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_68b.cpp | Line 58, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3628] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3629] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_72b.cpp | Line 57, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3630] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3631] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_73b.cpp | Line 57, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3632] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3633] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_char_cpy_74b.cpp | Line 57, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3634] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_51b.cpp | Line 35, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3635] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_51b.cpp | Line 53, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3636] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_52c.cpp | Line 35, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3637] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_52c.cpp | Line 53, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3638] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_53d.cpp | Line 35, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3639] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_53d.cpp | Line 53, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3640] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_54e.cpp | Line 35, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3641] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_54e.cpp | Line 53, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3642] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_63b.cpp | Line 34, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3643] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_63b.cpp | Line 53, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3644] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_64b.cpp | Line 37, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3645] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_64b.cpp | Line 59, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3646] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_65b.cpp | Line 33, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3647] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_65b.cpp | Line 51, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3648] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_66b.cpp | Line 35, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3649] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_66b.cpp | Line 54, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3650] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_67b.cpp | Line 39, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3651] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_67b.cpp | Line 58, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3652] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_68b.cpp | Line 39, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3653] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_68b.cpp | Line 58, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3654] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_72b.cpp | Line 38, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3655] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_72b.cpp | Line 57, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3656] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_73b.cpp | Line 38, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3657] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_73b.cpp | Line 57, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3658] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_74b.cpp | Line 38, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3659] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cat_74b.cpp | Line 57, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3660] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_51b.cpp | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3661] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_51b.cpp | Line 53, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3662] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_52c.cpp | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3663] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_52c.cpp | Line 53, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3664] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_53d.cpp | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3665] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_53d.cpp | Line 53, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3666] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_54e.cpp | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3667] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_54e.cpp | Line 53, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3668] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_63b.cpp | Line 34, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3669] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_63b.cpp | Line 53, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3670] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_64b.cpp | Line 37, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3671] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_64b.cpp | Line 59, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3672] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_65b.cpp | Line 33, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3673] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_65b.cpp | Line 51, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3674] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_66b.cpp | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3675] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_66b.cpp | Line 54, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3676] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_67b.cpp | Line 39, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3677] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_67b.cpp | Line 58, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3678] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_68b.cpp | Line 39, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3679] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_68b.cpp | Line 58, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3680] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3681] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_72b.cpp | Line 57, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3682] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3683] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_73b.cpp | Line 57, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3684] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3685] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_dest_wchar_t_cpy_74b.cpp | Line 57, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3686] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_51b.cpp | Line 33, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3687] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_51b.cpp | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3688] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_52c.cpp | Line 33, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3689] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_52c.cpp | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3690] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_53d.cpp | Line 33, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3691] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_53d.cpp | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3692] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_54e.cpp | Line 33, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3693] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_54e.cpp | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3694] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_63b.cpp | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3695] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_63b.cpp | Line 49, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3696] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_64b.cpp | Line 35, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3697] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_64b.cpp | Line 55, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3698] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_65b.cpp | Line 31, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3699] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_65b.cpp | Line 47, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3700] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_66b.cpp | Line 33, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3701] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_66b.cpp | Line 50, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3702] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_67b.cpp | Line 37, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3703] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_67b.cpp | Line 54, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3704] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_68b.cpp | Line 37, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3705] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_68b.cpp | Line 54, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3706] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_72b.cpp | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3707] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_72b.cpp | Line 53, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3708] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_73b.cpp | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3709] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_73b.cpp | Line 53, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3710] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_74b.cpp | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3711] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cat_74b.cpp | Line 53, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[3712] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_51b.cpp | Line 33, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3713] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_51b.cpp | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3714] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_52c.cpp | Line 33, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3715] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_52c.cpp | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3716] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_53d.cpp | Line 33, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3717] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_53d.cpp | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3718] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_54e.cpp | Line 33, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3719] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_54e.cpp | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3720] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_63b.cpp | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3721] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_63b.cpp | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3722] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_64b.cpp | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3723] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_64b.cpp | Line 55, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3724] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_65b.cpp | Line 31, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3725] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_65b.cpp | Line 47, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3726] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_66b.cpp | Line 33, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3727] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_66b.cpp | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3728] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_67b.cpp | Line 37, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3729] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_67b.cpp | Line 54, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3730] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_68b.cpp | Line 37, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3731] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_68b.cpp | Line 54, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3732] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3733] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_72b.cpp | Line 53, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3734] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3735] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_73b.cpp | Line 53, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3736] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3737] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_char_cpy_74b.cpp | Line 53, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3738] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_51b.cpp | Line 33, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3739] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_51b.cpp | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3740] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_52c.cpp | Line 33, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3741] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_52c.cpp | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3742] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_53d.cpp | Line 33, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3743] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_53d.cpp | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3744] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_54e.cpp | Line 33, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3745] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_54e.cpp | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3746] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_63b.cpp | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3747] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_63b.cpp | Line 49, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3748] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_64b.cpp | Line 35, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3749] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_64b.cpp | Line 55, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3750] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_65b.cpp | Line 31, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3751] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_65b.cpp | Line 47, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3752] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_66b.cpp | Line 33, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3753] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_66b.cpp | Line 50, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3754] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_67b.cpp | Line 37, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3755] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_67b.cpp | Line 54, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3756] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_68b.cpp | Line 37, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3757] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_68b.cpp | Line 54, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3758] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_72b.cpp | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3759] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_72b.cpp | Line 53, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3760] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_73b.cpp | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3761] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_73b.cpp | Line 53, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3762] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_74b.cpp | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3763] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cat_74b.cpp | Line 53, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3764] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_51b.cpp | Line 33, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3765] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_51b.cpp | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3766] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_52c.cpp | Line 33, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3767] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_52c.cpp | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3768] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_53d.cpp | Line 33, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3769] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_53d.cpp | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3770] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_54e.cpp | Line 33, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3771] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_54e.cpp | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3772] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_63b.cpp | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3773] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_63b.cpp | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3774] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_64b.cpp | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3775] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_64b.cpp | Line 55, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3776] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_65b.cpp | Line 31, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3777] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_65b.cpp | Line 47, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3778] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_66b.cpp | Line 33, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3779] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_66b.cpp | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3780] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_67b.cpp | Line 37, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3781] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_67b.cpp | Line 54, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3782] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_68b.cpp | Line 37, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3783] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_68b.cpp | Line 54, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3784] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3785] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_72b.cpp | Line 53, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3786] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3787] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_73b.cpp | Line 53, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3788] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3789] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s05/CWE122_Heap_Based_Buffer_Overflow__cpp_src_wchar_t_cpy_74b.cpp | Line 53, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3790] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_51b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3791] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_51b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3792] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_52c.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3793] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_52c.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3794] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_53d.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3795] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_53d.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3796] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_54e.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3797] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_54e.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3798] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_63b.c | Line 27, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3799] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_63b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3800] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_64b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3801] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_64b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3802] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_65b.c | Line 26, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3803] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_65b.c | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3804] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_66b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3805] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_66b.c | Line 45, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3806] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_67b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3807] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_67b.c | Line 49, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3808] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_68b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3809] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_68b.c | Line 49, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3810] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_72b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3811] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_72b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3812] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_73b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3813] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_73b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3814] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_74b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3815] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE131_memmove_74b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3816] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_22b.c | Line 36, Column 19
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3817] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_22b.c | Line 67, Column 19
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3818] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_22b.c | Line 84, Column 19
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3819] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_22b.c | Line 101, Column 19
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3820] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_51b.c | Line 31, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3821] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_51b.c | Line 49, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3822] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_51b.c | Line 63, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3823] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_52c.c | Line 31, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3824] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_52c.c | Line 49, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3825] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_52c.c | Line 63, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3826] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_53d.c | Line 31, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3827] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_53d.c | Line 49, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3828] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_53d.c | Line 63, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3829] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_54e.c | Line 31, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3830] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_54e.c | Line 49, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3831] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_54e.c | Line 63, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3832] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_62b.cpp | Line 47, Column 9
Pointer 'dataGoodBuffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataGoodBuffer = NULL;
[3833] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_62b.cpp | Line 50, Column 27
Pointer 'dataGoodBuffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3834] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_63b.c | Line 32, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3835] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_63b.c | Line 51, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3836] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_63b.c | Line 66, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3837] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_64b.c | Line 35, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3838] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_64b.c | Line 57, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3839] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_64b.c | Line 75, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3840] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_65b.c | Line 31, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3841] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_65b.c | Line 49, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3842] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_65b.c | Line 63, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3843] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_66b.c | Line 33, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3844] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_66b.c | Line 52, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3845] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_66b.c | Line 67, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3846] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_67b.c | Line 37, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3847] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_67b.c | Line 56, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3848] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_67b.c | Line 71, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3849] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_68b.c | Line 36, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3850] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_68b.c | Line 55, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3851] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_68b.c | Line 70, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3852] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_72b.cpp | Line 39, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3853] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_72b.cpp | Line 58, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3854] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_72b.cpp | Line 73, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3855] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_73b.cpp | Line 39, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3856] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_73b.cpp | Line 58, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3857] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_73b.cpp | Line 73, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3858] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_74b.cpp | Line 39, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3859] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_74b.cpp | Line 58, Column 15
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[3860] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__CWE135_74b.cpp | Line 73, Column 15
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3861] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 31, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3862] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 36, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3863] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 42, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3864] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 46, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3865] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 79, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3866] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 84, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3867] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 89, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3868] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 93, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3869] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 112, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3870] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 117, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3871] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 122, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3872] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 126, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3873] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 145, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3874] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 150, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3875] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 156, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3876] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_22b.c | Line 160, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3877] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_51b.c | Line 48, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3878] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_51b.c | Line 53, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3879] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_51b.c | Line 59, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3880] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_51b.c | Line 63, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3881] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_51b.c | Line 83, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3882] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_51b.c | Line 88, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3883] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_51b.c | Line 94, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3884] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_51b.c | Line 98, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3885] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_51b.c | Line 114, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3886] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_51b.c | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3887] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_51b.c | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3888] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_51b.c | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3889] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_52c.c | Line 48, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3890] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_52c.c | Line 53, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3891] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_52c.c | Line 59, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3892] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_52c.c | Line 63, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3893] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_52c.c | Line 83, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3894] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_52c.c | Line 88, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3895] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_52c.c | Line 94, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3896] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_52c.c | Line 98, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3897] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_52c.c | Line 114, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3898] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_52c.c | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3899] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_52c.c | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3900] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_52c.c | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3901] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_53d.c | Line 48, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3902] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_53d.c | Line 53, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3903] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_53d.c | Line 59, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3904] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_53d.c | Line 63, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3905] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_53d.c | Line 83, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3906] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_53d.c | Line 88, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3907] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_53d.c | Line 94, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3908] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_53d.c | Line 98, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3909] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_53d.c | Line 114, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3910] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_53d.c | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3911] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_53d.c | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3912] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_53d.c | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3913] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_54e.c | Line 48, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3914] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_54e.c | Line 53, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3915] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_54e.c | Line 59, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3916] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_54e.c | Line 63, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3917] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_54e.c | Line 83, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3918] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_54e.c | Line 88, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3919] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_54e.c | Line 94, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3920] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_54e.c | Line 98, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3921] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_54e.c | Line 114, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3922] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_54e.c | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3923] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_54e.c | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3924] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_54e.c | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3925] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_61b.c | Line 88, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3926] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_61b.c | Line 163, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3927] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_62b.cpp | Line 91, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3928] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_62b.cpp | Line 164, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[3929] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_63b.c | Line 49, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3930] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_63b.c | Line 54, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3931] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_63b.c | Line 60, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3932] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_63b.c | Line 64, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3933] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_63b.c | Line 85, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3934] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_63b.c | Line 90, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3935] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_63b.c | Line 96, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3936] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_63b.c | Line 100, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3937] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_63b.c | Line 117, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3938] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_63b.c | Line 122, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3939] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_63b.c | Line 127, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3940] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_63b.c | Line 131, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3941] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 47, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[3942] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 52, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3943] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 57, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3944] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 63, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3945] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 67, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3946] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 86, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[3947] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 91, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3948] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 96, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3949] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3950] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3951] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 121, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[3952] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 126, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3953] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 131, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3954] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 136, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3955] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_64b.c | Line 140, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3956] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_65b.c | Line 48, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3957] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_65b.c | Line 53, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3958] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_65b.c | Line 59, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3959] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_65b.c | Line 63, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3960] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_65b.c | Line 83, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3961] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_65b.c | Line 88, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3962] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_65b.c | Line 94, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3963] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_65b.c | Line 98, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3964] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_65b.c | Line 114, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3965] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_65b.c | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3966] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_65b.c | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3967] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_65b.c | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3968] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_66b.c | Line 50, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3969] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_66b.c | Line 55, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3970] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_66b.c | Line 61, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3971] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_66b.c | Line 65, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3972] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_66b.c | Line 86, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3973] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_66b.c | Line 91, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3974] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_66b.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3975] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_66b.c | Line 101, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3976] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_66b.c | Line 118, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3977] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_66b.c | Line 123, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3978] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_66b.c | Line 128, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3979] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_66b.c | Line 132, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3980] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_67b.c | Line 54, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3981] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_67b.c | Line 59, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3982] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_67b.c | Line 65, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3983] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_67b.c | Line 69, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3984] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_67b.c | Line 90, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3985] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_67b.c | Line 95, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3986] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_67b.c | Line 101, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3987] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_67b.c | Line 105, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3988] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_67b.c | Line 122, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3989] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_67b.c | Line 127, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3990] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_67b.c | Line 132, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3991] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_67b.c | Line 136, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3992] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_68b.c | Line 53, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3993] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_68b.c | Line 58, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3994] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_68b.c | Line 64, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3995] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_68b.c | Line 68, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3996] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_68b.c | Line 89, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[3997] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_68b.c | Line 94, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3998] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_68b.c | Line 100, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[3999] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_68b.c | Line 104, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4000] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_68b.c | Line 121, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4001] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_68b.c | Line 126, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4002] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_68b.c | Line 131, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4003] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_68b.c | Line 135, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4004] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_72b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4005] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_72b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4006] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_72b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4007] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_72b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4008] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_72b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4009] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_72b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4010] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_72b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4011] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_72b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4012] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_72b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4013] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_72b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4014] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_72b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4015] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_72b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4016] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_73b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4017] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_73b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4018] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_73b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4019] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_73b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4020] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_73b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4021] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_73b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4022] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_73b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4023] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_73b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4024] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_73b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4025] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_73b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4026] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_73b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4027] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_73b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4028] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_74b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4029] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_74b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4030] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_74b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4031] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_74b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4032] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_74b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4033] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_74b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4034] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_74b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4035] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_74b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4036] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_74b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4037] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_74b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4038] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_74b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4039] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_connect_socket_74b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4040] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 31, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4041] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 36, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4042] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 42, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4043] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 46, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4044] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 79, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4045] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 84, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4046] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 89, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4047] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 93, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4048] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 112, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4049] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 117, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4050] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 122, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4051] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 126, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4052] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 145, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4053] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 150, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4054] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 156, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4055] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_22b.c | Line 160, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4056] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_51b.c | Line 28, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4057] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_51b.c | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4058] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_51b.c | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4059] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_51b.c | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4060] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_51b.c | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4061] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_51b.c | Line 68, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4062] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_51b.c | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4063] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_51b.c | Line 78, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4064] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_51b.c | Line 94, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4065] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_51b.c | Line 99, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4066] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_51b.c | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4067] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_51b.c | Line 108, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4068] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_52c.c | Line 28, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4069] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_52c.c | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4070] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_52c.c | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4071] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_52c.c | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4072] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_52c.c | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4073] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_52c.c | Line 68, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4074] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_52c.c | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4075] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_52c.c | Line 78, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4076] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_52c.c | Line 94, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4077] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_52c.c | Line 99, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4078] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_52c.c | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4079] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_52c.c | Line 108, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4080] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_53d.c | Line 28, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4081] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_53d.c | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4082] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_53d.c | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4083] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_53d.c | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4084] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_53d.c | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4085] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_53d.c | Line 68, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4086] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_53d.c | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4087] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_53d.c | Line 78, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4088] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_53d.c | Line 94, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4089] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_53d.c | Line 99, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4090] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_53d.c | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4091] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_53d.c | Line 108, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4092] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_54e.c | Line 28, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4093] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_54e.c | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4094] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_54e.c | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4095] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_54e.c | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4096] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_54e.c | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4097] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_54e.c | Line 68, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4098] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_54e.c | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4099] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_54e.c | Line 78, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4100] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_54e.c | Line 94, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4101] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_54e.c | Line 99, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4102] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_54e.c | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4103] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_54e.c | Line 108, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4104] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_61b.c | Line 32, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4105] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_61b.c | Line 64, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4106] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_62b.cpp | Line 35, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4107] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_62b.cpp | Line 65, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4108] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_63b.c | Line 29, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4109] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_63b.c | Line 34, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4110] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_63b.c | Line 40, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4111] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_63b.c | Line 44, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4112] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_63b.c | Line 65, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4113] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_63b.c | Line 70, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4114] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_63b.c | Line 76, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4115] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_63b.c | Line 80, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4116] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_63b.c | Line 97, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4117] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_63b.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4118] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_63b.c | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4119] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_63b.c | Line 111, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4120] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 27, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4121] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 32, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4122] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4123] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 43, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4124] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 47, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4125] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 66, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4126] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 71, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4127] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 76, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4128] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 82, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4129] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 86, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4130] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 101, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4131] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 106, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4132] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 111, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4133] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 116, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4134] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_64b.c | Line 120, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4135] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_65b.c | Line 28, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4136] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_65b.c | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4137] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_65b.c | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4138] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_65b.c | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4139] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_65b.c | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4140] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_65b.c | Line 68, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4141] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_65b.c | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4142] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_65b.c | Line 78, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4143] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_65b.c | Line 94, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4144] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_65b.c | Line 99, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4145] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_65b.c | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4146] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_65b.c | Line 108, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4147] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_66b.c | Line 30, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4148] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_66b.c | Line 35, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4149] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_66b.c | Line 41, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4150] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_66b.c | Line 45, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4151] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_66b.c | Line 66, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4152] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_66b.c | Line 71, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4153] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_66b.c | Line 77, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4154] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_66b.c | Line 81, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4155] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_66b.c | Line 98, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4156] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_66b.c | Line 103, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4157] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_66b.c | Line 108, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4158] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_66b.c | Line 112, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4159] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_67b.c | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4160] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_67b.c | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4161] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_67b.c | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4162] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_67b.c | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4163] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_67b.c | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4164] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_67b.c | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4165] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_67b.c | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4166] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_67b.c | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4167] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_67b.c | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4168] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_67b.c | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4169] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_67b.c | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4170] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_67b.c | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4171] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_68b.c | Line 33, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4172] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_68b.c | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4173] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_68b.c | Line 44, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4174] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_68b.c | Line 48, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4175] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_68b.c | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4176] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_68b.c | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4177] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_68b.c | Line 80, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4178] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_68b.c | Line 84, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4179] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_68b.c | Line 101, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4180] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_68b.c | Line 106, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4181] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_68b.c | Line 111, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4182] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_68b.c | Line 115, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4183] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_72b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4184] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_72b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4185] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_72b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4186] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_72b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4187] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_72b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4188] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_72b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4189] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_72b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4190] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_72b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4191] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_72b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4192] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_72b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4193] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_72b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4194] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_72b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4195] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_73b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4196] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_73b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4197] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_73b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4198] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_73b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4199] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_73b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4200] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_73b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4201] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_73b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4202] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_73b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4203] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_73b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4204] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_73b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4205] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_73b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4206] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_73b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4207] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_74b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4208] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_74b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4209] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_74b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4210] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_74b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4211] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_74b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4212] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_74b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4213] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_74b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4214] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_74b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4215] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_74b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4216] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_74b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4217] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_74b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4218] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fgets_74b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4219] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 31, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4220] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 36, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4221] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 42, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4222] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 46, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4223] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 79, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4224] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 84, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4225] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 89, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4226] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 93, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4227] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 112, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4228] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 117, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4229] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 122, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4230] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 126, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4231] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 145, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4232] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 150, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4233] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 156, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4234] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_22b.c | Line 160, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4235] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_51b.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4236] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_51b.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4237] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_51b.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4238] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_51b.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4239] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_51b.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4240] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_51b.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4241] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_51b.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4242] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_51b.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4243] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_51b.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4244] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_51b.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4245] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_51b.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4246] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_51b.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4247] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_52c.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4248] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_52c.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4249] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_52c.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4250] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_52c.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4251] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_52c.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4252] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_52c.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4253] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_52c.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4254] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_52c.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4255] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_52c.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4256] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_52c.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4257] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_52c.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4258] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_52c.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4259] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_53d.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4260] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_53d.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4261] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_53d.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4262] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_53d.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4263] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_53d.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4264] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_53d.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4265] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_53d.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4266] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_53d.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4267] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_53d.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4268] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_53d.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4269] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_53d.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4270] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_53d.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4271] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_54e.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4272] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_54e.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4273] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_54e.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4274] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_54e.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4275] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_54e.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4276] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_54e.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4277] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_54e.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4278] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_54e.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4279] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_54e.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4280] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_54e.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4281] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_54e.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4282] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_54e.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4283] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_61b.c | Line 25, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4284] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_61b.c | Line 46, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4285] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4286] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_62b.cpp | Line 47, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4287] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_63b.c | Line 27, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4288] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_63b.c | Line 32, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4289] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_63b.c | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4290] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_63b.c | Line 42, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4291] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_63b.c | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4292] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_63b.c | Line 68, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4293] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_63b.c | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4294] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_63b.c | Line 78, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4295] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_63b.c | Line 95, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4296] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_63b.c | Line 100, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4297] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_63b.c | Line 105, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4298] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_63b.c | Line 109, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4299] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4300] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 30, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4301] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 35, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4302] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 41, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4303] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 45, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4304] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 64, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4305] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4306] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4307] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 80, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4308] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 84, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4309] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 99, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4310] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 104, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4311] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4312] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 114, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4313] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_64b.c | Line 118, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4314] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_65b.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4315] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_65b.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4316] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_65b.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4317] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_65b.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4318] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_65b.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4319] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_65b.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4320] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_65b.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4321] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_65b.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4322] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_65b.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4323] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_65b.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4324] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_65b.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4325] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_65b.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4326] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_66b.c | Line 28, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4327] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_66b.c | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4328] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_66b.c | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4329] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_66b.c | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4330] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_66b.c | Line 64, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4331] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_66b.c | Line 69, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4332] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_66b.c | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4333] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_66b.c | Line 79, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4334] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_66b.c | Line 96, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4335] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_66b.c | Line 101, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4336] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_66b.c | Line 106, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4337] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_66b.c | Line 110, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4338] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_67b.c | Line 32, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4339] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_67b.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4340] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_67b.c | Line 43, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4341] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_67b.c | Line 47, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4342] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_67b.c | Line 68, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4343] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_67b.c | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4344] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_67b.c | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4345] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_67b.c | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4346] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_67b.c | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4347] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_67b.c | Line 105, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4348] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_67b.c | Line 110, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4349] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_67b.c | Line 114, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4350] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_68b.c | Line 31, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4351] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_68b.c | Line 36, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4352] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_68b.c | Line 42, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4353] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_68b.c | Line 46, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4354] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_68b.c | Line 67, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4355] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_68b.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4356] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_68b.c | Line 78, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4357] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_68b.c | Line 82, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4358] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_68b.c | Line 99, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4359] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_68b.c | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4360] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_68b.c | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4361] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_68b.c | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4362] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_72b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4363] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_72b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4364] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_72b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4365] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_72b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4366] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_72b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4367] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_72b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4368] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_72b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4369] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_72b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4370] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_72b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4371] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_72b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4372] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_72b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4373] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_72b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4374] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_73b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4375] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_73b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4376] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_73b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4377] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_73b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4378] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_73b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4379] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_73b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4380] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_73b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4381] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_73b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4382] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_73b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4383] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_73b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4384] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_73b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4385] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_73b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4386] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_74b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4387] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_74b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4388] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_74b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4389] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_74b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4390] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_74b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4391] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_74b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4392] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_74b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4393] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_74b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4394] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_74b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4395] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_74b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4396] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_74b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4397] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_fscanf_74b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4398] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 31, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4399] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 36, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4400] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 42, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4401] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 46, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4402] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 79, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4403] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 84, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4404] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 89, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4405] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 93, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4406] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 112, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4407] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 117, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4408] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 122, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4409] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 126, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4410] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 145, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4411] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 150, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4412] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 156, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4413] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_22b.c | Line 160, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4414] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_51b.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4415] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_51b.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4416] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_51b.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4417] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_51b.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4418] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_51b.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4419] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_51b.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4420] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_51b.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4421] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_51b.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4422] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_51b.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4423] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_51b.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4424] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_51b.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4425] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_51b.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4426] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_52c.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4427] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_52c.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4428] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_52c.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4429] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_52c.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4430] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_52c.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4431] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_52c.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4432] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_52c.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4433] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_52c.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4434] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_52c.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4435] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_52c.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4436] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_52c.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4437] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_52c.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4438] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_53d.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4439] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_53d.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4440] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_53d.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4441] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_53d.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4442] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_53d.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4443] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_53d.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4444] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_53d.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4445] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_53d.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4446] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_53d.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4447] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_53d.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4448] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_53d.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4449] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_53d.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4450] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_54e.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4451] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_54e.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4452] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_54e.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4453] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_54e.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4454] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_54e.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4455] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_54e.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4456] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_54e.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4457] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_54e.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4458] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_54e.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4459] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_54e.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4460] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_54e.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4461] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_54e.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4462] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_63b.c | Line 27, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4463] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_63b.c | Line 32, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4464] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_63b.c | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4465] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_63b.c | Line 42, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4466] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_63b.c | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4467] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_63b.c | Line 68, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4468] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_63b.c | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4469] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_63b.c | Line 78, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4470] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_63b.c | Line 95, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4471] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_63b.c | Line 100, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4472] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_63b.c | Line 105, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4473] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_63b.c | Line 109, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4474] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4475] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 30, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4476] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 35, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4477] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 41, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4478] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 45, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4479] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 64, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4480] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4481] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4482] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 80, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4483] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 84, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4484] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 99, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4485] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 104, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4486] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4487] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 114, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4488] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_64b.c | Line 118, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4489] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_65b.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4490] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_65b.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4491] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_65b.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4492] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_65b.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4493] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_65b.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4494] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_65b.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4495] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_65b.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4496] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_65b.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4497] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_65b.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4498] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_65b.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4499] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_65b.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4500] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_65b.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4501] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_66b.c | Line 28, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4502] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_66b.c | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4503] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_66b.c | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4504] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_66b.c | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4505] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_66b.c | Line 64, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4506] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_66b.c | Line 69, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4507] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_66b.c | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4508] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_66b.c | Line 79, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4509] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_66b.c | Line 96, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4510] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_66b.c | Line 101, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4511] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_66b.c | Line 106, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4512] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_66b.c | Line 110, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4513] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_67b.c | Line 32, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4514] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_67b.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4515] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_67b.c | Line 43, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4516] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_67b.c | Line 47, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4517] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_67b.c | Line 68, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4518] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_67b.c | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4519] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_67b.c | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4520] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_67b.c | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4521] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_67b.c | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4522] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_67b.c | Line 105, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4523] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_67b.c | Line 110, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4524] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_67b.c | Line 114, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4525] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_68b.c | Line 31, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4526] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_68b.c | Line 36, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4527] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_68b.c | Line 42, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4528] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_68b.c | Line 46, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4529] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_68b.c | Line 67, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4530] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_68b.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4531] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_68b.c | Line 78, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4532] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_68b.c | Line 82, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4533] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_68b.c | Line 99, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4534] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_68b.c | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4535] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_68b.c | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4536] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_68b.c | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4537] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_72b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4538] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_72b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4539] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_72b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4540] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_72b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4541] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_72b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4542] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_72b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4543] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_72b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4544] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_72b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4545] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_72b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4546] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_72b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4547] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_72b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4548] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_72b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4549] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_73b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4550] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_73b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4551] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_73b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4552] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_73b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4553] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_73b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4554] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_73b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4555] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_73b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4556] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_73b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4557] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_73b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4558] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_73b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4559] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_73b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4560] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_73b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4561] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_74b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4562] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_74b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4563] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_74b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4564] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_74b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4565] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_74b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4566] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_74b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4567] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_74b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4568] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_74b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4569] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_74b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4570] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_74b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4571] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_74b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4572] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_large_74b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4573] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 31, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4574] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 36, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4575] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 42, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4576] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 46, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4577] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 79, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4578] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 84, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4579] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 89, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4580] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 93, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4581] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 112, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4582] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 117, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4583] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 122, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4584] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 126, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4585] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 145, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4586] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 150, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4587] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 156, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4588] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_22b.c | Line 160, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4589] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_51b.c | Line 48, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4590] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_51b.c | Line 53, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4591] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_51b.c | Line 59, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4592] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_51b.c | Line 63, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4593] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_51b.c | Line 83, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4594] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_51b.c | Line 88, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4595] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_51b.c | Line 94, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4596] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_51b.c | Line 98, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4597] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_51b.c | Line 114, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4598] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_51b.c | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4599] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_51b.c | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4600] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_51b.c | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4601] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_52c.c | Line 48, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4602] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_52c.c | Line 53, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4603] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_52c.c | Line 59, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4604] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_52c.c | Line 63, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4605] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_52c.c | Line 83, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4606] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_52c.c | Line 88, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4607] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_52c.c | Line 94, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4608] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_52c.c | Line 98, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4609] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_52c.c | Line 114, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4610] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_52c.c | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4611] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_52c.c | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4612] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_52c.c | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4613] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_53d.c | Line 48, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4614] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_53d.c | Line 53, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4615] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_53d.c | Line 59, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4616] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_53d.c | Line 63, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4617] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_53d.c | Line 83, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4618] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_53d.c | Line 88, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4619] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_53d.c | Line 94, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4620] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_53d.c | Line 98, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4621] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_53d.c | Line 114, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4622] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_53d.c | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4623] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_53d.c | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4624] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_53d.c | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4625] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_54e.c | Line 48, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4626] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_54e.c | Line 53, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4627] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_54e.c | Line 59, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4628] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_54e.c | Line 63, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4629] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_54e.c | Line 83, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4630] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_54e.c | Line 88, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4631] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_54e.c | Line 94, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4632] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_54e.c | Line 98, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4633] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_54e.c | Line 114, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4634] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_54e.c | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4635] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_54e.c | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4636] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_54e.c | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4637] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_61b.c | Line 97, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4638] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_61b.c | Line 185, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4639] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_63b.c | Line 49, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4640] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_63b.c | Line 54, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4641] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_63b.c | Line 60, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4642] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_63b.c | Line 64, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4643] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_63b.c | Line 85, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4644] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_63b.c | Line 90, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4645] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_63b.c | Line 96, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4646] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_63b.c | Line 100, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4647] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_63b.c | Line 117, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4648] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_63b.c | Line 122, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4649] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_63b.c | Line 127, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4650] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_63b.c | Line 131, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4651] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 47, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4652] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 52, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4653] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 57, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4654] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 63, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4655] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 67, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4656] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 86, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4657] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 91, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4658] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 96, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4659] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4660] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4661] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 121, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4662] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 126, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4663] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 131, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4664] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 136, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4665] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_64b.c | Line 140, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4666] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_65b.c | Line 48, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4667] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_65b.c | Line 53, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4668] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_65b.c | Line 59, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4669] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_65b.c | Line 63, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4670] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_65b.c | Line 83, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4671] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_65b.c | Line 88, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4672] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_65b.c | Line 94, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4673] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_65b.c | Line 98, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4674] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_65b.c | Line 114, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4675] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_65b.c | Line 119, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4676] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_65b.c | Line 124, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4677] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_65b.c | Line 128, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4678] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_66b.c | Line 50, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4679] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_66b.c | Line 55, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4680] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_66b.c | Line 61, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4681] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_66b.c | Line 65, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4682] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_66b.c | Line 86, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4683] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_66b.c | Line 91, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4684] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_66b.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4685] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_66b.c | Line 101, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4686] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_66b.c | Line 118, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4687] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_66b.c | Line 123, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4688] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_66b.c | Line 128, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4689] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_66b.c | Line 132, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4690] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_67b.c | Line 54, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4691] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_67b.c | Line 59, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4692] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_67b.c | Line 65, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4693] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_67b.c | Line 69, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4694] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_67b.c | Line 90, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4695] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_67b.c | Line 95, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4696] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_67b.c | Line 101, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4697] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_67b.c | Line 105, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4698] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_67b.c | Line 122, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4699] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_67b.c | Line 127, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4700] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_67b.c | Line 132, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4701] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_67b.c | Line 136, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4702] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_68b.c | Line 53, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4703] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_68b.c | Line 58, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4704] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_68b.c | Line 64, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4705] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_68b.c | Line 68, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4706] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_68b.c | Line 89, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4707] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_68b.c | Line 94, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4708] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_68b.c | Line 100, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4709] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_68b.c | Line 104, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4710] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_68b.c | Line 121, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4711] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_68b.c | Line 126, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4712] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_68b.c | Line 131, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4713] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_68b.c | Line 135, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4714] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_72b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4715] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_72b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4716] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_72b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4717] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_72b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4718] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_72b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4719] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_72b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4720] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_72b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4721] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_72b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4722] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_72b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4723] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_72b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4724] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_72b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4725] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_72b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4726] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_73b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4727] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_73b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4728] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_73b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4729] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_73b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4730] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_73b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4731] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_73b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4732] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_73b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4733] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_73b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4734] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_73b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4735] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_73b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4736] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_73b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4737] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_73b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4738] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_74b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4739] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_74b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4740] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_74b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4741] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_74b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4742] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_74b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4743] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_74b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4744] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_74b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4745] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_74b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4746] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_74b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4747] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_74b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4748] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_74b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4749] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_listen_socket_74b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4750] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 31, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4751] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 36, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4752] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 42, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4753] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 46, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4754] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 79, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4755] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 84, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4756] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 89, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4757] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 93, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4758] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 112, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4759] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 117, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4760] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 122, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4761] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 126, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4762] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 145, Column 13
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4763] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 150, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4764] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 156, Column 24
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4765] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_22b.c | Line 160, Column 41
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4766] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_51b.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4767] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_51b.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4768] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_51b.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4769] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_51b.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4770] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_51b.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4771] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_51b.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4772] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_51b.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4773] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_51b.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4774] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_51b.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4775] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_51b.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4776] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_51b.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4777] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_51b.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4778] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_52c.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4779] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_52c.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4780] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_52c.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4781] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_52c.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4782] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_52c.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4783] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_52c.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4784] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_52c.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4785] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_52c.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4786] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_52c.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4787] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_52c.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4788] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_52c.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4789] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_52c.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4790] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_53d.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4791] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_53d.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4792] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_53d.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4793] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_53d.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4794] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_53d.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4795] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_53d.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4796] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_53d.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4797] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_53d.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4798] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_53d.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4799] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_53d.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4800] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_53d.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4801] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_53d.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4802] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_54e.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4803] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_54e.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4804] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_54e.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4805] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_54e.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4806] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_54e.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4807] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_54e.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4808] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_54e.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4809] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_54e.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4810] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_54e.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4811] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_54e.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4812] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_54e.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4813] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_54e.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4814] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_63b.c | Line 27, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4815] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_63b.c | Line 32, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4816] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_63b.c | Line 38, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4817] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_63b.c | Line 42, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4818] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_63b.c | Line 63, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4819] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_63b.c | Line 68, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4820] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_63b.c | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4821] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_63b.c | Line 78, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4822] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_63b.c | Line 95, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4823] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_63b.c | Line 100, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4824] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_63b.c | Line 105, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4825] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_63b.c | Line 109, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4826] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4827] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 30, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4828] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 35, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4829] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 41, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4830] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 45, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4831] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 64, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4832] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 69, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4833] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 74, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4834] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 80, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4835] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 84, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4836] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 99, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[4837] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 104, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4838] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4839] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 114, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4840] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_64b.c | Line 118, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4841] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_65b.c | Line 26, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4842] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_65b.c | Line 31, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4843] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_65b.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4844] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_65b.c | Line 41, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4845] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_65b.c | Line 61, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4846] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_65b.c | Line 66, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4847] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_65b.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4848] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_65b.c | Line 76, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4849] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_65b.c | Line 92, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4850] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_65b.c | Line 97, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4851] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_65b.c | Line 102, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4852] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_65b.c | Line 106, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4853] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_66b.c | Line 28, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4854] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_66b.c | Line 33, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4855] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_66b.c | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4856] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_66b.c | Line 43, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4857] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_66b.c | Line 64, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4858] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_66b.c | Line 69, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4859] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_66b.c | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4860] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_66b.c | Line 79, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4861] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_66b.c | Line 96, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4862] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_66b.c | Line 101, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4863] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_66b.c | Line 106, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4864] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_66b.c | Line 110, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4865] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_67b.c | Line 32, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4866] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_67b.c | Line 37, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4867] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_67b.c | Line 43, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4868] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_67b.c | Line 47, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4869] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_67b.c | Line 68, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4870] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_67b.c | Line 73, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4871] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_67b.c | Line 79, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4872] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_67b.c | Line 83, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4873] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_67b.c | Line 100, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4874] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_67b.c | Line 105, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4875] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_67b.c | Line 110, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4876] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_67b.c | Line 114, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4877] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_68b.c | Line 31, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4878] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_68b.c | Line 36, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4879] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_68b.c | Line 42, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4880] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_68b.c | Line 46, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4881] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_68b.c | Line 67, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4882] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_68b.c | Line 72, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4883] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_68b.c | Line 78, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4884] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_68b.c | Line 82, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4885] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_68b.c | Line 99, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4886] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_68b.c | Line 104, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4887] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_68b.c | Line 109, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4888] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_68b.c | Line 113, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4889] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_72b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4890] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_72b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4891] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_72b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4892] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_72b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4893] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_72b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4894] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_72b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4895] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_72b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4896] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_72b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4897] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_72b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4898] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_72b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4899] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_72b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4900] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_72b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4901] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_73b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4902] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_73b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4903] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_73b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4904] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_73b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4905] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_73b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4906] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_73b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4907] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_73b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4908] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_73b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4909] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_73b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4910] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_73b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4911] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_73b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4912] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_73b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4913] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_74b.cpp | Line 34, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4914] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_74b.cpp | Line 39, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4915] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_74b.cpp | Line 45, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4916] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_74b.cpp | Line 49, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4917] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_74b.cpp | Line 70, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4918] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_74b.cpp | Line 75, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4919] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_74b.cpp | Line 81, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4920] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_74b.cpp | Line 85, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4921] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_74b.cpp | Line 102, Column 9
Pointer 'buffer' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* buffer = NULL;
[4922] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_74b.cpp | Line 107, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4923] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_74b.cpp | Line 112, Column 20
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4924] Uninitialized Pointer Use
CRITICAL
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE129_rand_74b.cpp | Line 116, Column 37
Pointer 'buffer' used before initialization
💡 Recommendation: Initialize pointer before use
[4925] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_51b.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4926] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_51b.c | Line 51, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4927] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_52c.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4928] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_52c.c | Line 51, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4929] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_53d.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4930] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_53d.c | Line 51, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4931] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_54e.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4932] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_54e.c | Line 51, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4933] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_63b.c | Line 34, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4934] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_63b.c | Line 51, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4935] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_64b.c | Line 37, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4936] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_64b.c | Line 57, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4937] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_65b.c | Line 33, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4938] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_65b.c | Line 49, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4939] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_66b.c | Line 35, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4940] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_66b.c | Line 52, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4941] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_67b.c | Line 39, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4942] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_67b.c | Line 56, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4943] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_68b.c | Line 39, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4944] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_68b.c | Line 56, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4945] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_72b.cpp | Line 41, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4946] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_72b.cpp | Line 58, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4947] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_73b.cpp | Line 41, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4948] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_73b.cpp | Line 58, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4949] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_74b.cpp | Line 41, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4950] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_cpy_74b.cpp | Line 58, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[4951] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_51b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4952] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_51b.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4953] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_52c.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4954] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_52c.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4955] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_53d.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4956] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_53d.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4957] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_54e.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4958] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_54e.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4959] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_63b.c | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4960] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_63b.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4961] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_64b.c | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4962] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_64b.c | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4963] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_65b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4964] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_65b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4965] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_66b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4966] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_66b.c | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4967] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_67b.c | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4968] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_67b.c | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4969] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_68b.c | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4970] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_68b.c | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4971] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_72b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4972] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_72b.cpp | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4973] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_73b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4974] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_73b.cpp | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4975] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_74b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4976] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s06/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memcpy_74b.cpp | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4977] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_51b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4978] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_51b.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4979] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_52c.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4980] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_52c.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4981] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_53d.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4982] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_53d.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4983] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_54e.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4984] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_54e.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4985] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_63b.c | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4986] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_63b.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4987] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_64b.c | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4988] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_64b.c | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4989] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_65b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4990] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_65b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4991] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_66b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4992] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_66b.c | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4993] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_67b.c | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4994] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_67b.c | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4995] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_68b.c | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4996] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_68b.c | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4997] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_72b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4998] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_72b.cpp | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[4999] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_73b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5000] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_73b.cpp | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5001] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_74b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5002] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_memmove_74b.cpp | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5003] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_51b.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5004] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_51b.c | Line 53, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5005] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_52c.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5006] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_52c.c | Line 53, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5007] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_53d.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5008] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_53d.c | Line 53, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5009] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_54e.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5010] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_54e.c | Line 53, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5011] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_63b.c | Line 35, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5012] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_63b.c | Line 53, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5013] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_64b.c | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5014] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_64b.c | Line 59, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5015] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_65b.c | Line 34, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5016] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_65b.c | Line 51, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5017] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_66b.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5018] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_66b.c | Line 54, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5019] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_67b.c | Line 40, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5020] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_67b.c | Line 58, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5021] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_68b.c | Line 40, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5022] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_68b.c | Line 58, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5023] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_72b.cpp | Line 42, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5024] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_72b.cpp | Line 60, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5025] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_73b.cpp | Line 42, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5026] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_73b.cpp | Line 60, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5027] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_74b.cpp | Line 42, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5028] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_char_ncpy_74b.cpp | Line 60, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5029] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_51b.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5030] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_51b.c | Line 51, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5031] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_52c.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5032] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_52c.c | Line 51, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5033] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_53d.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5034] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_53d.c | Line 51, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5035] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_54e.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5036] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_54e.c | Line 51, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5037] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_63b.c | Line 34, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5038] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_63b.c | Line 51, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5039] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_64b.c | Line 37, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5040] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_64b.c | Line 57, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5041] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_65b.c | Line 33, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5042] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_65b.c | Line 49, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5043] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_66b.c | Line 35, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5044] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_66b.c | Line 52, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5045] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_67b.c | Line 39, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5046] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_67b.c | Line 56, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5047] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_68b.c | Line 39, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5048] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_68b.c | Line 56, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5049] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_72b.cpp | Line 41, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5050] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_72b.cpp | Line 58, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5051] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_73b.cpp | Line 41, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5052] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_73b.cpp | Line 58, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5053] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_74b.cpp | Line 41, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5054] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_cpy_74b.cpp | Line 58, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5055] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_51b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5056] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_51b.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5057] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_52c.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5058] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_52c.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5059] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_53d.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5060] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_53d.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5061] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_54e.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5062] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_54e.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5063] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_63b.c | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5064] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_63b.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5065] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_64b.c | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5066] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_64b.c | Line 59, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5067] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_65b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5068] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_65b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5069] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_66b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5070] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_66b.c | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5071] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_67b.c | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5072] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_67b.c | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5073] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_68b.c | Line 40, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5074] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_68b.c | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5075] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_72b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5076] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_72b.cpp | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5077] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_73b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5078] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_73b.cpp | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5079] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_74b.cpp | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5080] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memcpy_74b.cpp | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5081] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_51b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5082] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_51b.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5083] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_52c.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5084] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_52c.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5085] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_53d.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5086] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_53d.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5087] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_54e.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5088] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_54e.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5089] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_63b.c | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5090] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_63b.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5091] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_64b.c | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5092] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_64b.c | Line 59, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5093] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_65b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5094] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_65b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5095] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_66b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5096] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_66b.c | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5097] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_67b.c | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5098] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_67b.c | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5099] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_68b.c | Line 40, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5100] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_68b.c | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5101] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_72b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5102] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_72b.cpp | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5103] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_73b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5104] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_73b.cpp | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5105] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_74b.cpp | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5106] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE193_wchar_t_memmove_74b.cpp | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5107] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_51b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5108] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_51b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5109] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_52c.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5110] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_52c.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5111] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_53d.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5112] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_53d.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5113] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_54e.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5114] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_54e.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5115] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_63b.c | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5116] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_63b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5117] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_64b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5118] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_64b.c | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5119] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_65b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5120] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_65b.c | Line 49, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5121] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_66b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5122] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_66b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5123] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_67b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5124] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_67b.c | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5125] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_68b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5126] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_68b.c | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5127] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5128] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_72b.cpp | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5129] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5130] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_73b.cpp | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5131] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5132] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memcpy_74b.cpp | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5133] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_51b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5134] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_51b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5135] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_52c.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5136] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_52c.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5137] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_53d.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5138] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_53d.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5139] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_54e.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5140] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_54e.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5141] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_63b.c | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5142] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_63b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5143] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_64b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5144] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_64b.c | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5145] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_65b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5146] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_65b.c | Line 49, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5147] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_66b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5148] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_66b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5149] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_67b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5150] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_67b.c | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5151] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_68b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5152] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_68b.c | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5153] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_72b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5154] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_72b.cpp | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5155] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_73b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5156] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_73b.cpp | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5157] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_74b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5158] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_memmove_74b.cpp | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5159] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_51b.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5160] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_51b.c | Line 50, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5161] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_52c.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5162] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_52c.c | Line 50, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5163] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_53d.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5164] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_53d.c | Line 50, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5165] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_54e.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5166] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_54e.c | Line 50, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5167] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_63b.c | Line 31, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5168] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_63b.c | Line 50, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5169] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_64b.c | Line 34, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5170] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_64b.c | Line 56, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5171] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_65b.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5172] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_65b.c | Line 48, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5173] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_66b.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5174] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_66b.c | Line 51, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5175] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_67b.c | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5176] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_67b.c | Line 55, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5177] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_68b.c | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5178] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_68b.c | Line 55, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5179] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_72b.cpp | Line 38, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5180] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_72b.cpp | Line 57, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5181] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_73b.cpp | Line 38, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5182] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_73b.cpp | Line 57, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5183] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_74b.cpp | Line 38, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5184] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncat_74b.cpp | Line 57, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5185] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_51b.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5186] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_51b.c | Line 51, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5187] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_52c.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5188] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_52c.c | Line 51, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5189] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_53d.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5190] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_53d.c | Line 51, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5191] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_54e.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5192] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_54e.c | Line 51, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5193] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_63b.c | Line 31, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5194] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_63b.c | Line 51, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5195] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_64b.c | Line 34, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5196] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_64b.c | Line 57, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5197] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_65b.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5198] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_65b.c | Line 49, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5199] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_66b.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5200] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_66b.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5201] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_67b.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5202] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_67b.c | Line 56, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5203] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_68b.c | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5204] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_68b.c | Line 56, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5205] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5206] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_72b.cpp | Line 58, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5207] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5208] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_73b.cpp | Line 58, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5209] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5210] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s07/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_char_ncpy_74b.cpp | Line 58, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5211] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_51b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5212] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_51b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5213] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_52c.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5214] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_52c.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5215] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_53d.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5216] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_53d.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5217] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_54e.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5218] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_54e.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5219] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_63b.c | Line 27, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5220] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_63b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5221] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_64b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5222] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_64b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5223] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_65b.c | Line 26, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5224] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_65b.c | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5225] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_66b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5226] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_66b.c | Line 45, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5227] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_67b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5228] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_67b.c | Line 49, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5229] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_68b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5230] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_68b.c | Line 49, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5231] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_72b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5232] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_72b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5233] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_73b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5234] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_73b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5235] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_74b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5236] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memcpy_74b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5237] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_51b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5238] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_51b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5239] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_52c.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5240] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_52c.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5241] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_53d.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5242] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_53d.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5243] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_54e.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5244] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_54e.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5245] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_63b.c | Line 27, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5246] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_63b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5247] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_64b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5248] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_64b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5249] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_65b.c | Line 26, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5250] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_65b.c | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5251] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_66b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5252] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_66b.c | Line 45, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5253] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_67b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5254] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_67b.c | Line 49, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5255] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_68b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5256] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_68b.c | Line 49, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5257] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_72b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5258] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_72b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5259] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_73b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5260] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_73b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5261] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_74b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5262] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int64_t_memmove_74b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5263] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_51b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5264] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_51b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5265] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_52c.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5266] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_52c.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5267] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_53d.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5268] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_53d.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5269] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_54e.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5270] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_54e.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5271] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_63b.c | Line 27, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5272] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_63b.c | Line 44, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5273] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_64b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5274] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_64b.c | Line 50, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5275] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_65b.c | Line 26, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5276] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_65b.c | Line 42, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5277] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_66b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5278] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_66b.c | Line 45, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5279] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_67b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5280] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_67b.c | Line 49, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5281] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_68b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5282] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_68b.c | Line 49, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5283] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_72b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5284] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_72b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5285] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_73b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5286] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_73b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5287] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_74b.cpp | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5288] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memcpy_74b.cpp | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5289] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_51b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5290] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_51b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5291] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_52c.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5292] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_52c.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5293] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_53d.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5294] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_53d.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5295] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_54e.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5296] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_54e.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5297] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_63b.c | Line 27, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5298] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_63b.c | Line 44, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5299] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_64b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5300] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_64b.c | Line 50, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5301] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_65b.c | Line 26, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5302] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_65b.c | Line 42, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5303] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_66b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5304] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_66b.c | Line 45, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5305] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_67b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5306] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_67b.c | Line 49, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5307] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_68b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5308] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_68b.c | Line 49, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5309] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_72b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5310] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_72b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5311] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_73b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5312] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_73b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5313] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_74b.cpp | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5314] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_int_memmove_74b.cpp | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5315] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_51b.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5316] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_51b.c | Line 62, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5317] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_52c.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5318] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_52c.c | Line 62, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5319] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_53d.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5320] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_53d.c | Line 62, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5321] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_54e.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5322] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_54e.c | Line 62, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5323] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_63b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5324] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_63b.c | Line 62, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5325] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_64b.c | Line 39, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5326] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_64b.c | Line 68, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5327] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_65b.c | Line 35, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5328] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_65b.c | Line 60, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5329] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_66b.c | Line 37, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5330] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_66b.c | Line 63, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5331] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_67b.c | Line 41, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5332] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_67b.c | Line 67, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5333] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_68b.c | Line 41, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5334] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_68b.c | Line 67, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5335] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_72b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5336] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_72b.cpp | Line 69, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5337] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_73b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5338] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_73b.cpp | Line 69, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5339] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_74b.cpp | Line 43, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5340] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memcpy_74b.cpp | Line 69, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5341] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_51b.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5342] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_51b.c | Line 62, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5343] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_52c.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5344] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_52c.c | Line 62, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5345] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_53d.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5346] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_53d.c | Line 62, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5347] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_54e.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5348] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_54e.c | Line 62, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5349] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_63b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5350] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_63b.c | Line 62, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5351] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_64b.c | Line 39, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5352] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_64b.c | Line 68, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5353] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_65b.c | Line 35, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5354] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_65b.c | Line 60, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5355] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_66b.c | Line 37, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5356] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_66b.c | Line 63, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5357] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_67b.c | Line 41, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5358] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_67b.c | Line 67, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5359] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_68b.c | Line 41, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5360] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_68b.c | Line 67, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5361] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_72b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5362] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_72b.cpp | Line 69, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5363] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_73b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5364] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_73b.cpp | Line 69, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5365] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_74b.cpp | Line 43, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5366] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_struct_memmove_74b.cpp | Line 69, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5367] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_51b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5368] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_51b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5369] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_52c.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5370] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_52c.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5371] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_53d.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5372] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_53d.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5373] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_54e.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5374] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_54e.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5375] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_63b.c | Line 31, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5376] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_63b.c | Line 51, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5377] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_64b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5378] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_64b.c | Line 57, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5379] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_65b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5380] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_65b.c | Line 49, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5381] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_66b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5382] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_66b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5383] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_67b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5384] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_67b.c | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5385] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_68b.c | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5386] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_68b.c | Line 56, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5387] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5388] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_72b.cpp | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5389] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5390] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_73b.cpp | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5391] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5392] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s08/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memcpy_74b.cpp | Line 58, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5393] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_51b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5394] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_51b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5395] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_52c.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5396] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_52c.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5397] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_53d.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5398] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_53d.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5399] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_54e.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5400] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_54e.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5401] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_63b.c | Line 31, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5402] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_63b.c | Line 51, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5403] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_64b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5404] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_64b.c | Line 57, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5405] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_65b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5406] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_65b.c | Line 49, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5407] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_66b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5408] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_66b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5409] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_67b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5410] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_67b.c | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5411] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_68b.c | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5412] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_68b.c | Line 56, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5413] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_72b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5414] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_72b.cpp | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5415] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_73b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5416] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_73b.cpp | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5417] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_74b.cpp | Line 38, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5418] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE805_wchar_t_memmove_74b.cpp | Line 58, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5419] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_51b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5420] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_51b.c | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5421] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_52c.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5422] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_52c.c | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5423] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_53d.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5424] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_53d.c | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5425] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_54e.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5426] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_54e.c | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5427] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_63b.c | Line 29, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5428] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_63b.c | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5429] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_64b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5430] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_64b.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5431] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_65b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5432] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_65b.c | Line 45, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5433] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_66b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5434] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_66b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5435] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_67b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5436] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_67b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5437] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_68b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5438] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_68b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5439] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5440] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_72b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5441] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5442] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_73b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5443] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5444] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memcpy_74b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5445] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_51b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5446] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_51b.c | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5447] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_52c.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5448] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_52c.c | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5449] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_53d.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5450] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_53d.c | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5451] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_54e.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5452] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_54e.c | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5453] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_63b.c | Line 29, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5454] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_63b.c | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5455] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_64b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5456] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_64b.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5457] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_65b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5458] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_65b.c | Line 45, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5459] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_66b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5460] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_66b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5461] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_67b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5462] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_67b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5463] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_68b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5464] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_68b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5465] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_72b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5466] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_72b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5467] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_73b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5468] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_73b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5469] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_74b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5470] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_memmove_74b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5471] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_51b.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5472] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_51b.c | Line 47, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5473] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_52c.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5474] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_52c.c | Line 47, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5475] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_53d.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5476] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_53d.c | Line 47, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5477] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_54e.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5478] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_54e.c | Line 47, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5479] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_63b.c | Line 29, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5480] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_63b.c | Line 47, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5481] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_64b.c | Line 32, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5482] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_64b.c | Line 53, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5483] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_65b.c | Line 28, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5484] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_65b.c | Line 45, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5485] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_66b.c | Line 30, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5486] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_66b.c | Line 48, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5487] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_67b.c | Line 34, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5488] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_67b.c | Line 52, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5489] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_68b.c | Line 34, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5490] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_68b.c | Line 52, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5491] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_72b.cpp | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5492] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_72b.cpp | Line 54, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5493] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_73b.cpp | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5494] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_73b.cpp | Line 54, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5495] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_74b.cpp | Line 36, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5496] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncat_74b.cpp | Line 54, Column 9
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5497] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_51b.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5498] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_51b.c | Line 47, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5499] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_52c.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5500] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_52c.c | Line 47, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5501] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_53d.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5502] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_53d.c | Line 47, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5503] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_54e.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5504] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_54e.c | Line 47, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5505] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_63b.c | Line 29, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5506] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_63b.c | Line 47, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5507] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_64b.c | Line 32, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5508] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_64b.c | Line 53, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5509] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_65b.c | Line 28, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5510] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_65b.c | Line 45, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5511] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_66b.c | Line 30, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5512] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_66b.c | Line 48, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5513] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_67b.c | Line 34, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5514] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_67b.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5515] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_68b.c | Line 34, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5516] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_68b.c | Line 52, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5517] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5518] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_72b.cpp | Line 54, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5519] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5520] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_73b.cpp | Line 54, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5521] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5522] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_char_ncpy_74b.cpp | Line 54, Column 9
Use of unsafe function 'strncpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5523] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_51b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5524] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_51b.c | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5525] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_52c.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5526] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_52c.c | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5527] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_53d.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5528] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_53d.c | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5529] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_54e.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5530] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_54e.c | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5531] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_63b.c | Line 29, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5532] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_63b.c | Line 47, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5533] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_64b.c | Line 32, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5534] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_64b.c | Line 53, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5535] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_65b.c | Line 28, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5536] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_65b.c | Line 45, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5537] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_66b.c | Line 30, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5538] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_66b.c | Line 48, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5539] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_67b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5540] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_67b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5541] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_68b.c | Line 34, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5542] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_68b.c | Line 52, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5543] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5544] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_72b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5545] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5546] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_73b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5547] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5548] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s09/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memcpy_74b.cpp | Line 54, Column 9
Use of unsafe function 'memcpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5549] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_51b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5550] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_51b.c | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5551] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_52c.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5552] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_52c.c | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5553] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_53d.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5554] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_53d.c | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5555] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_54e.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5556] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_54e.c | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5557] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_63b.c | Line 29, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5558] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_63b.c | Line 47, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5559] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_64b.c | Line 32, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5560] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_64b.c | Line 53, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5561] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_65b.c | Line 28, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5562] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_65b.c | Line 45, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5563] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_66b.c | Line 30, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5564] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_66b.c | Line 48, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5565] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_67b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5566] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_67b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5567] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_68b.c | Line 34, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5568] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_68b.c | Line 52, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5569] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_72b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5570] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_72b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5571] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_73b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5572] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_73b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5573] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_74b.cpp | Line 36, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5574] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_CWE806_wchar_t_memmove_74b.cpp | Line 54, Column 9
Use of unsafe function 'memmove' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5575] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_51b.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5576] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_51b.c | Line 50, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5577] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_52c.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5578] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_52c.c | Line 50, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5579] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_53d.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5580] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_53d.c | Line 50, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5581] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_54e.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5582] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_54e.c | Line 50, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5583] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_63b.c | Line 31, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5584] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_63b.c | Line 50, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5585] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_64b.c | Line 34, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5586] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_64b.c | Line 56, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5587] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_65b.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5588] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_65b.c | Line 48, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5589] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_66b.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5590] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_66b.c | Line 51, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5591] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_67b.c | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5592] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_67b.c | Line 55, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5593] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_68b.c | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5594] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_68b.c | Line 55, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5595] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_72b.cpp | Line 38, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5596] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_72b.cpp | Line 57, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5597] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_73b.cpp | Line 38, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5598] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_73b.cpp | Line 57, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5599] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_74b.cpp | Line 38, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5600] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cat_74b.cpp | Line 57, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5601] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_51b.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5602] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_51b.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5603] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_52c.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5604] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_52c.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5605] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_53d.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5606] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_53d.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5607] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_54e.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5608] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_54e.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5609] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_63b.c | Line 31, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5610] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_63b.c | Line 50, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5611] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_64b.c | Line 34, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5612] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_64b.c | Line 56, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5613] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_65b.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5614] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_65b.c | Line 48, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5615] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_66b.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5616] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_66b.c | Line 51, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5617] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_67b.c | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5618] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_67b.c | Line 55, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5619] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_68b.c | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5620] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_68b.c | Line 55, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5621] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5622] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_72b.cpp | Line 57, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5623] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5624] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_73b.cpp | Line 57, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5625] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5626] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_char_cpy_74b.cpp | Line 57, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5627] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_51b.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5628] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_51b.c | Line 50, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5629] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_52c.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5630] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_52c.c | Line 50, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5631] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_53d.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5632] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_53d.c | Line 50, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5633] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_54e.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5634] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_54e.c | Line 50, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5635] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_63b.c | Line 31, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5636] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_63b.c | Line 50, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5637] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_64b.c | Line 34, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5638] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_64b.c | Line 56, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5639] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_65b.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5640] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_65b.c | Line 48, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5641] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_66b.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5642] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_66b.c | Line 51, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5643] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_67b.c | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5644] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_67b.c | Line 55, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5645] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_68b.c | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5646] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_68b.c | Line 55, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5647] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_72b.cpp | Line 38, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5648] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_72b.cpp | Line 57, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5649] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_73b.cpp | Line 38, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5650] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_73b.cpp | Line 57, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5651] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_74b.cpp | Line 38, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5652] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cat_74b.cpp | Line 57, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5653] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_51b.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5654] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_51b.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5655] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_52c.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5656] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_52c.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5657] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_53d.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5658] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_53d.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5659] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_54e.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5660] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_54e.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5661] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_63b.c | Line 31, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5662] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_63b.c | Line 50, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5663] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_64b.c | Line 34, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5664] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_64b.c | Line 56, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5665] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_65b.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5666] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_65b.c | Line 48, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5667] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_66b.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5668] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_66b.c | Line 51, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5669] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_67b.c | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5670] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_67b.c | Line 55, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5671] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_68b.c | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5672] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_68b.c | Line 55, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5673] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_72b.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5674] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_72b.cpp | Line 57, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5675] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_73b.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5676] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_73b.cpp | Line 57, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5677] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_74b.cpp | Line 38, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5678] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_dest_wchar_t_cpy_74b.cpp | Line 57, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5679] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_51b.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5680] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_51b.c | Line 46, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5681] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_52c.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5682] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_52c.c | Line 46, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5683] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_53d.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5684] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_53d.c | Line 46, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5685] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_54e.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5686] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_54e.c | Line 46, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5687] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_63b.c | Line 29, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5688] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_63b.c | Line 46, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5689] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_64b.c | Line 32, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5690] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_64b.c | Line 52, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5691] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_65b.c | Line 28, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5692] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_65b.c | Line 44, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5693] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_66b.c | Line 30, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5694] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_66b.c | Line 47, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5695] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_67b.c | Line 34, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5696] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_67b.c | Line 51, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5697] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_68b.c | Line 34, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5698] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_68b.c | Line 51, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5699] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_72b.cpp | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5700] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_72b.cpp | Line 53, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5701] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_73b.cpp | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5702] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_73b.cpp | Line 53, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5703] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_74b.cpp | Line 36, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5704] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cat_74b.cpp | Line 53, Column 9
Use of unsafe function 'strcat' which does not perform bounds checking
💡 Recommendation: Use strncat() instead and ensure proper null termination
[5705] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_51b.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5706] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_51b.c | Line 46, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5707] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_52c.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5708] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_52c.c | Line 46, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5709] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_53d.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5710] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_53d.c | Line 46, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5711] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_54e.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5712] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_54e.c | Line 46, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5713] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_63b.c | Line 29, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5714] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_63b.c | Line 46, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5715] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_64b.c | Line 32, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5716] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_64b.c | Line 52, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5717] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_65b.c | Line 28, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5718] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_65b.c | Line 44, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5719] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_66b.c | Line 30, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5720] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_66b.c | Line 47, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5721] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_67b.c | Line 34, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5722] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_67b.c | Line 51, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5723] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_68b.c | Line 34, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5724] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_68b.c | Line 51, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5725] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5726] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_72b.cpp | Line 53, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5727] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5728] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_73b.cpp | Line 53, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5729] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5730] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_char_cpy_74b.cpp | Line 53, Column 9
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5731] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_51b.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5732] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_51b.c | Line 46, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5733] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_52c.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5734] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_52c.c | Line 46, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5735] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_53d.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5736] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_53d.c | Line 46, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5737] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_54e.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5738] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_54e.c | Line 46, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5739] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_63b.c | Line 29, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5740] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_63b.c | Line 46, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5741] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_64b.c | Line 32, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5742] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_64b.c | Line 52, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5743] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_65b.c | Line 28, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5744] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_65b.c | Line 44, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5745] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_66b.c | Line 30, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5746] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_66b.c | Line 47, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5747] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_67b.c | Line 34, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5748] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_67b.c | Line 51, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5749] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_68b.c | Line 34, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5750] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_68b.c | Line 51, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5751] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_72b.cpp | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5752] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_72b.cpp | Line 53, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5753] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_73b.cpp | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5754] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_73b.cpp | Line 53, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5755] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_74b.cpp | Line 36, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5756] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cat_74b.cpp | Line 53, Column 9
Use of unsafe function 'wcscat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5757] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_51b.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5758] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_51b.c | Line 46, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5759] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_52c.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5760] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_52c.c | Line 46, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5761] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_53d.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5762] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_53d.c | Line 46, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5763] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_54e.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5764] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_54e.c | Line 46, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5765] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_63b.c | Line 29, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5766] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_63b.c | Line 46, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5767] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_64b.c | Line 32, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5768] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_64b.c | Line 52, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5769] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_65b.c | Line 28, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5770] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_65b.c | Line 44, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5771] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_66b.c | Line 30, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5772] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_66b.c | Line 47, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5773] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_67b.c | Line 34, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5774] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_67b.c | Line 51, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5775] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_68b.c | Line 34, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5776] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_68b.c | Line 51, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5777] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_72b.cpp | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5778] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_72b.cpp | Line 53, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5779] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_73b.cpp | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5780] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_73b.cpp | Line 53, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5781] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_74b.cpp | Line 36, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5782] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE122_Heap_Based_Buffer_Overflow/s10/CWE122_Heap_Based_Buffer_Overflow__c_src_wchar_t_cpy_74b.cpp | Line 53, Column 9
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[5783] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_22b.c | Line 34, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5784] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_22b.c | Line 58, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5785] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_22b.c | Line 68, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5786] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_22b.c | Line 78, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5787] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_51b.c | Line 50, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5788] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_51b.c | Line 61, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5789] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_51b.c | Line 68, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5790] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_52c.c | Line 50, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5791] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_52c.c | Line 61, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5792] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_52c.c | Line 68, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5793] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_53d.c | Line 50, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5794] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_53d.c | Line 61, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5795] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_53d.c | Line 68, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5796] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_54e.c | Line 50, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5797] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_54e.c | Line 61, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5798] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_54e.c | Line 68, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5799] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_62b.cpp | Line 129, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5800] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_62b.cpp | Line 59, Column 9
Pointer 'replace' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* replace = NULL;
[5801] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_62b.cpp | Line 142, Column 9
Pointer 'replace' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* replace = NULL;
[5802] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_63b.c | Line 51, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5803] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_63b.c | Line 63, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5804] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_63b.c | Line 71, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5805] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_64b.c | Line 54, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5806] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_64b.c | Line 69, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5807] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_64b.c | Line 80, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5808] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_65b.c | Line 50, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5809] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_65b.c | Line 61, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5810] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_65b.c | Line 68, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5811] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_66b.c | Line 52, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5812] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_66b.c | Line 64, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5813] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_66b.c | Line 72, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5814] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_67b.c | Line 56, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5815] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_67b.c | Line 68, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5816] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_67b.c | Line 76, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5817] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_68b.c | Line 55, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5818] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_68b.c | Line 67, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5819] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_68b.c | Line 75, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5820] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_72b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5821] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_72b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5822] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_72b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5823] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_73b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5824] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_73b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5825] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_73b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5826] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_74b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5827] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_74b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5828] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_fprintf_74b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5829] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_22b.c | Line 34, Column 9
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5830] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_22b.c | Line 78, Column 9
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5831] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_51b.c | Line 50, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5832] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_51b.c | Line 61, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5833] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_52c.c | Line 50, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5834] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_52c.c | Line 61, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5835] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_53d.c | Line 50, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5836] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_53d.c | Line 61, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5837] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_54e.c | Line 50, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5838] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_54e.c | Line 61, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5839] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_62b.cpp | Line 129, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5840] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_62b.cpp | Line 59, Column 9
Pointer 'replace' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* replace = NULL;
[5841] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_62b.cpp | Line 142, Column 9
Pointer 'replace' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* replace = NULL;
[5842] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_63b.c | Line 51, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5843] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_63b.c | Line 63, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5844] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_64b.c | Line 54, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5845] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_64b.c | Line 69, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5846] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_65b.c | Line 50, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5847] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_65b.c | Line 61, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5848] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_66b.c | Line 52, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5849] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_66b.c | Line 64, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5850] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_67b.c | Line 56, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5851] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_67b.c | Line 68, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5852] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_68b.c | Line 55, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5853] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_68b.c | Line 67, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5854] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_72b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5855] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_72b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5856] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_73b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5857] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_73b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5858] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_74b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5859] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_printf_74b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[5860] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_snprintf_62b.cpp | Line 129, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5861] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_snprintf_62b.cpp | Line 59, Column 9
Pointer 'replace' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* replace = NULL;
[5862] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_snprintf_62b.cpp | Line 142, Column 9
Pointer 'replace' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* replace = NULL;
[5863] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_22b.c | Line 38, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5864] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_22b.c | Line 67, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5865] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_22b.c | Line 82, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5866] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_22b.c | Line 97, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5867] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_51b.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5868] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_51b.c | Line 75, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5869] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_51b.c | Line 92, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5870] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_52c.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5871] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_52c.c | Line 75, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5872] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_52c.c | Line 92, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5873] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_53d.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5874] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_53d.c | Line 75, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5875] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_53d.c | Line 92, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5876] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_54e.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5877] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_54e.c | Line 75, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5878] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_54e.c | Line 92, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5879] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_62b.cpp | Line 129, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5880] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_62b.cpp | Line 59, Column 9
Pointer 'replace' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* replace = NULL;
[5881] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_62b.cpp | Line 142, Column 9
Pointer 'replace' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* replace = NULL;
[5882] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_63b.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5883] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_63b.c | Line 76, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5884] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_63b.c | Line 94, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5885] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_64b.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5886] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_64b.c | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5887] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_64b.c | Line 100, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5888] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_65b.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5889] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_65b.c | Line 70, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5890] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_65b.c | Line 82, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5891] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_66b.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5892] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_66b.c | Line 77, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5893] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_66b.c | Line 95, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5894] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_67b.c | Line 59, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5895] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_67b.c | Line 81, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5896] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_67b.c | Line 99, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5897] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_68b.c | Line 58, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5898] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_68b.c | Line 80, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5899] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_68b.c | Line 98, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5900] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_72b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5901] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_72b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5902] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_72b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5903] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_73b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5904] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_73b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5905] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_73b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5906] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_74b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5907] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_74b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5908] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vfprintf_74b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[5909] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_22b.c | Line 38, Column 13
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5910] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_22b.c | Line 97, Column 13
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5911] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_51b.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5912] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_51b.c | Line 75, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5913] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_52c.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5914] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_52c.c | Line 75, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5915] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_53d.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5916] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_53d.c | Line 75, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5917] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_54e.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5918] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_54e.c | Line 75, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5919] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_62b.cpp | Line 129, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5920] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_62b.cpp | Line 59, Column 9
Pointer 'replace' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* replace = NULL;
[5921] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_62b.cpp | Line 142, Column 9
Pointer 'replace' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* replace = NULL;
[5922] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_63b.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5923] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_63b.c | Line 76, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5924] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_64b.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5925] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_64b.c | Line 79, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5926] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_65b.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5927] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_65b.c | Line 70, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5928] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_66b.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5929] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_66b.c | Line 77, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5930] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_67b.c | Line 59, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5931] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_67b.c | Line 81, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5932] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_68b.c | Line 58, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5933] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_68b.c | Line 80, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5934] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_72b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5935] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_72b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5936] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_73b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5937] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_73b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5938] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_74b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5939] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_vprintf_74b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[5940] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_22b.c | Line 39, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5941] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_22b.c | Line 70, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5942] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_22b.c | Line 87, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5943] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_22b.c | Line 104, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5944] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_51b.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5945] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_51b.c | Line 78, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5946] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_51b.c | Line 97, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5947] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_52c.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5948] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_52c.c | Line 78, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5949] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_52c.c | Line 97, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5950] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_53d.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5951] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_53d.c | Line 78, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5952] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_53d.c | Line 97, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5953] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_54e.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5954] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_54e.c | Line 78, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5955] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_54e.c | Line 97, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5956] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_62b.cpp | Line 129, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[5957] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_62b.cpp | Line 59, Column 9
Pointer 'replace' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* replace = NULL;
[5958] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_62b.cpp | Line 142, Column 9
Pointer 'replace' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* replace = NULL;
[5959] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_63b.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5960] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_63b.c | Line 79, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5961] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_63b.c | Line 99, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5962] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_64b.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5963] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_64b.c | Line 82, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5964] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_64b.c | Line 105, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5965] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_65b.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5966] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_65b.c | Line 73, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5967] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_65b.c | Line 87, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5968] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_66b.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5969] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_66b.c | Line 80, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5970] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_66b.c | Line 100, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5971] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_67b.c | Line 60, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5972] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_67b.c | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5973] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_67b.c | Line 104, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5974] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_68b.c | Line 59, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5975] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_68b.c | Line 83, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5976] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_68b.c | Line 103, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5977] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_72b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5978] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_72b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5979] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_72b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5980] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_73b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5981] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_73b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5982] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_73b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5983] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_74b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5984] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_74b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5985] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_connect_socket_w32_vsnprintf_74b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[5986] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_22b.c | Line 34, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5987] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_22b.c | Line 58, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5988] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_22b.c | Line 68, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5989] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_22b.c | Line 78, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5990] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_51b.c | Line 29, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5991] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_51b.c | Line 40, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5992] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_51b.c | Line 47, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5993] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_52c.c | Line 29, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5994] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_52c.c | Line 40, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5995] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_52c.c | Line 47, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5996] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_53d.c | Line 29, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5997] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_53d.c | Line 40, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5998] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_53d.c | Line 47, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[5999] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_54e.c | Line 29, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6000] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_54e.c | Line 40, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6001] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_54e.c | Line 47, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6002] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_62b.cpp | Line 66, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6003] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_63b.c | Line 30, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6004] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_63b.c | Line 42, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6005] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_63b.c | Line 50, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6006] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_64b.c | Line 33, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6007] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_64b.c | Line 48, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6008] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_64b.c | Line 59, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6009] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_65b.c | Line 29, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6010] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_65b.c | Line 40, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6011] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_65b.c | Line 47, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6012] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_66b.c | Line 31, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6013] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_66b.c | Line 43, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6014] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_66b.c | Line 51, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6015] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_67b.c | Line 35, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6016] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_67b.c | Line 47, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6017] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_67b.c | Line 55, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6018] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_68b.c | Line 34, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6019] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_68b.c | Line 46, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6020] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_68b.c | Line 54, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6021] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_72b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6022] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_72b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6023] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_72b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6024] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_73b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6025] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_73b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6026] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_73b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6027] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_74b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6028] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_74b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6029] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_fprintf_74b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6030] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_22b.c | Line 34, Column 9
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6031] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_22b.c | Line 78, Column 9
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6032] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_51b.c | Line 29, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6033] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_51b.c | Line 40, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6034] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_52c.c | Line 29, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6035] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_52c.c | Line 40, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6036] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_53d.c | Line 29, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6037] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_53d.c | Line 40, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6038] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_54e.c | Line 29, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6039] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_54e.c | Line 40, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6040] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_62b.cpp | Line 66, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6041] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_63b.c | Line 30, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6042] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_63b.c | Line 42, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6043] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_64b.c | Line 33, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6044] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_64b.c | Line 48, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6045] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_65b.c | Line 29, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6046] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_65b.c | Line 40, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6047] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_66b.c | Line 31, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6048] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_66b.c | Line 43, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6049] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_67b.c | Line 35, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6050] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_67b.c | Line 47, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6051] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_68b.c | Line 34, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6052] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_68b.c | Line 46, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6053] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_72b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6054] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_72b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6055] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_73b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6056] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_73b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6057] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_74b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6058] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_printf_74b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6059] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_snprintf_62b.cpp | Line 66, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6060] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_22b.c | Line 38, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6061] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_22b.c | Line 67, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6062] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_22b.c | Line 82, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6063] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_22b.c | Line 97, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6064] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_51b.c | Line 33, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6065] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_51b.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6066] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_51b.c | Line 71, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6067] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_52c.c | Line 33, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6068] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_52c.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6069] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_52c.c | Line 71, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6070] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_53d.c | Line 33, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6071] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_53d.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6072] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_53d.c | Line 71, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6073] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_54e.c | Line 33, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6074] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_54e.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6075] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_54e.c | Line 71, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6076] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_62b.cpp | Line 66, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6077] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_63b.c | Line 33, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6078] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_63b.c | Line 55, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6079] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_63b.c | Line 73, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6080] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_64b.c | Line 33, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6081] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_64b.c | Line 58, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6082] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_64b.c | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6083] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_65b.c | Line 33, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6084] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_65b.c | Line 49, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6085] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_65b.c | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6086] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_66b.c | Line 33, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6087] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_66b.c | Line 56, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6088] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_66b.c | Line 74, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6089] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_67b.c | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6090] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_67b.c | Line 60, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6091] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_67b.c | Line 78, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6092] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_68b.c | Line 37, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6093] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_68b.c | Line 59, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6094] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_68b.c | Line 77, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6095] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_72b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6096] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_72b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6097] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_72b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6098] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_73b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6099] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_73b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6100] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_73b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6101] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_74b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6102] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_74b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6103] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vfprintf_74b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6104] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_22b.c | Line 38, Column 13
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6105] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_22b.c | Line 97, Column 13
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6106] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_51b.c | Line 33, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6107] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_51b.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6108] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_52c.c | Line 33, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6109] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_52c.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6110] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_53d.c | Line 33, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6111] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_53d.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6112] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_54e.c | Line 33, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6113] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_54e.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6114] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_62b.cpp | Line 66, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6115] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_63b.c | Line 33, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6116] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_63b.c | Line 55, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6117] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_64b.c | Line 33, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6118] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_64b.c | Line 58, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6119] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_65b.c | Line 33, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6120] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_65b.c | Line 49, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6121] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_66b.c | Line 33, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6122] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_66b.c | Line 56, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6123] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_67b.c | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6124] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_67b.c | Line 60, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6125] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_68b.c | Line 37, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6126] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_68b.c | Line 59, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6127] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_72b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6128] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_72b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6129] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_73b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6130] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_73b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6131] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_74b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6132] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s01/CWE134_Uncontrolled_Format_String__char_console_vprintf_74b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6133] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_22b.c | Line 39, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6134] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_22b.c | Line 70, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6135] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_22b.c | Line 87, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6136] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_22b.c | Line 104, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6137] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_51b.c | Line 34, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6138] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_51b.c | Line 57, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6139] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_51b.c | Line 76, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6140] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_52c.c | Line 34, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6141] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_52c.c | Line 57, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6142] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_52c.c | Line 76, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6143] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_53d.c | Line 34, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6144] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_53d.c | Line 57, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6145] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_53d.c | Line 76, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6146] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_54e.c | Line 34, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6147] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_54e.c | Line 57, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6148] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_54e.c | Line 76, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6149] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_62b.cpp | Line 66, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6150] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_63b.c | Line 34, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6151] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_63b.c | Line 58, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6152] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_63b.c | Line 78, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6153] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_64b.c | Line 34, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6154] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_64b.c | Line 61, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6155] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_64b.c | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6156] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_65b.c | Line 34, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6157] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_65b.c | Line 52, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6158] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_65b.c | Line 66, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6159] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_66b.c | Line 34, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6160] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_66b.c | Line 59, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6161] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_66b.c | Line 79, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6162] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_67b.c | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6163] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_67b.c | Line 63, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6164] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_67b.c | Line 83, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6165] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_68b.c | Line 38, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6166] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_68b.c | Line 62, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6167] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_68b.c | Line 82, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6168] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_72b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6169] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_72b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6170] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_72b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6171] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_73b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6172] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_73b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6173] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_73b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6174] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_74b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6175] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_74b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6176] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_console_w32_vsnprintf_74b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6177] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_22b.c | Line 34, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6178] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_22b.c | Line 58, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6179] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_22b.c | Line 68, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6180] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_22b.c | Line 78, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6181] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_51b.c | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6182] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_51b.c | Line 48, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6183] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_51b.c | Line 55, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6184] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_52c.c | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6185] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_52c.c | Line 48, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6186] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_52c.c | Line 55, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6187] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_53d.c | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6188] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_53d.c | Line 48, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6189] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_53d.c | Line 55, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6190] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_54e.c | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6191] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_54e.c | Line 48, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6192] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_54e.c | Line 55, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6193] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_62b.cpp | Line 47, Column 13
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6194] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_62b.cpp | Line 60, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6195] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_62b.cpp | Line 74, Column 13
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6196] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_63b.c | Line 38, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6197] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_63b.c | Line 50, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6198] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_63b.c | Line 58, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6199] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_64b.c | Line 41, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6200] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_64b.c | Line 56, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6201] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_64b.c | Line 67, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6202] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_65b.c | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6203] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_65b.c | Line 48, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6204] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_65b.c | Line 55, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6205] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_66b.c | Line 39, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6206] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_66b.c | Line 51, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6207] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_66b.c | Line 59, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6208] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_67b.c | Line 43, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6209] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_67b.c | Line 55, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6210] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_67b.c | Line 63, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6211] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_68b.c | Line 42, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6212] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_68b.c | Line 54, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6213] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_68b.c | Line 62, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6214] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_72b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6215] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_72b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6216] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_72b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6217] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_73b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6218] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_73b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6219] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_73b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6220] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_74b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6221] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_74b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6222] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_fprintf_74b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6223] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_22b.c | Line 34, Column 9
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6224] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_22b.c | Line 78, Column 9
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6225] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_51b.c | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6226] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_51b.c | Line 48, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6227] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_52c.c | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6228] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_52c.c | Line 48, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6229] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_53d.c | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6230] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_53d.c | Line 48, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6231] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_54e.c | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6232] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_54e.c | Line 48, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6233] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_62b.cpp | Line 47, Column 13
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6234] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_62b.cpp | Line 60, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6235] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_62b.cpp | Line 74, Column 13
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6236] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_63b.c | Line 38, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6237] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_63b.c | Line 50, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6238] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_64b.c | Line 41, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6239] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_64b.c | Line 56, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6240] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_65b.c | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6241] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_65b.c | Line 48, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6242] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_66b.c | Line 39, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6243] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_66b.c | Line 51, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6244] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_67b.c | Line 43, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6245] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_67b.c | Line 55, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6246] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_68b.c | Line 42, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6247] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_68b.c | Line 54, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6248] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_72b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6249] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_72b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6250] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_73b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6251] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_73b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6252] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_74b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6253] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_printf_74b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6254] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_snprintf_62b.cpp | Line 47, Column 13
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6255] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_snprintf_62b.cpp | Line 60, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6256] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_snprintf_62b.cpp | Line 74, Column 13
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6257] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_22b.c | Line 38, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6258] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_22b.c | Line 67, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6259] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_22b.c | Line 82, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6260] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_22b.c | Line 97, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6261] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_51b.c | Line 41, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6262] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_51b.c | Line 62, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6263] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_51b.c | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6264] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_52c.c | Line 41, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6265] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_52c.c | Line 62, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6266] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_52c.c | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6267] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_53d.c | Line 41, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6268] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_53d.c | Line 62, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6269] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_53d.c | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6270] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_54e.c | Line 41, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6271] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_54e.c | Line 62, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6272] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_54e.c | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6273] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_62b.cpp | Line 47, Column 13
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6274] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_62b.cpp | Line 60, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6275] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_62b.cpp | Line 74, Column 13
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6276] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_63b.c | Line 41, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6277] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_63b.c | Line 63, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6278] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_63b.c | Line 81, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6279] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_64b.c | Line 41, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6280] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_64b.c | Line 66, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6281] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_64b.c | Line 87, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6282] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_65b.c | Line 41, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6283] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_65b.c | Line 57, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6284] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_65b.c | Line 69, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6285] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_66b.c | Line 41, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6286] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_66b.c | Line 64, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6287] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_66b.c | Line 82, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6288] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_67b.c | Line 46, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6289] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_67b.c | Line 68, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6290] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_67b.c | Line 86, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6291] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_68b.c | Line 45, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6292] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_68b.c | Line 67, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6293] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_68b.c | Line 85, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6294] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_72b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6295] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_72b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6296] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_72b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6297] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_73b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6298] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_73b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6299] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_73b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6300] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_74b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6301] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_74b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6302] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vfprintf_74b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6303] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_22b.c | Line 38, Column 13
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6304] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_22b.c | Line 97, Column 13
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6305] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_51b.c | Line 41, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6306] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_51b.c | Line 62, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6307] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_52c.c | Line 41, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6308] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_52c.c | Line 62, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6309] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_53d.c | Line 41, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6310] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_53d.c | Line 62, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6311] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_54e.c | Line 41, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6312] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_54e.c | Line 62, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6313] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_62b.cpp | Line 47, Column 13
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6314] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_62b.cpp | Line 60, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6315] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_62b.cpp | Line 74, Column 13
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6316] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_63b.c | Line 41, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6317] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_63b.c | Line 63, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6318] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_64b.c | Line 41, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6319] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_64b.c | Line 66, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6320] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_65b.c | Line 41, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6321] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_65b.c | Line 57, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6322] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_66b.c | Line 41, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6323] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_66b.c | Line 64, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6324] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_67b.c | Line 46, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6325] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_67b.c | Line 68, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6326] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_68b.c | Line 45, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6327] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_68b.c | Line 67, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6328] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_72b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6329] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_72b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6330] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_73b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6331] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_73b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6332] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_74b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6333] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_vprintf_74b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6334] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_22b.c | Line 39, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6335] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_22b.c | Line 70, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6336] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_22b.c | Line 87, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6337] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_22b.c | Line 104, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6338] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_51b.c | Line 42, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6339] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_51b.c | Line 65, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6340] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_51b.c | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6341] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_52c.c | Line 42, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6342] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_52c.c | Line 65, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6343] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_52c.c | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6344] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_53d.c | Line 42, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6345] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_53d.c | Line 65, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6346] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_53d.c | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6347] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_54e.c | Line 42, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6348] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_54e.c | Line 65, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6349] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_54e.c | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6350] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_62b.cpp | Line 47, Column 13
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6351] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_62b.cpp | Line 60, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6352] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_62b.cpp | Line 74, Column 13
Use of unsafe function 'strncat' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6353] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_63b.c | Line 42, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6354] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_63b.c | Line 66, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6355] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_63b.c | Line 86, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6356] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_64b.c | Line 42, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6357] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_64b.c | Line 69, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6358] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_64b.c | Line 92, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6359] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_65b.c | Line 42, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6360] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_65b.c | Line 60, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6361] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_65b.c | Line 74, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6362] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_66b.c | Line 42, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6363] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_66b.c | Line 67, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6364] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_66b.c | Line 87, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6365] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_67b.c | Line 47, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6366] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_67b.c | Line 71, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6367] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_67b.c | Line 91, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6368] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_68b.c | Line 46, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6369] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_68b.c | Line 70, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6370] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_68b.c | Line 90, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6371] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_72b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6372] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_72b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6373] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_72b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6374] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_73b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6375] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_73b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6376] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_73b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6377] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_74b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6378] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_74b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6379] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_environment_w32_vsnprintf_74b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6380] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_22b.c | Line 34, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6381] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_22b.c | Line 58, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6382] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_22b.c | Line 68, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6383] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_22b.c | Line 78, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6384] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_51b.c | Line 35, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6385] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_51b.c | Line 46, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6386] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_51b.c | Line 53, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6387] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_52c.c | Line 35, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6388] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_52c.c | Line 46, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6389] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_52c.c | Line 53, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6390] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_53d.c | Line 35, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6391] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_53d.c | Line 46, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6392] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_53d.c | Line 53, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6393] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_54e.c | Line 35, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6394] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_54e.c | Line 46, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6395] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_54e.c | Line 53, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6396] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_62b.cpp | Line 68, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6397] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_63b.c | Line 36, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6398] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_63b.c | Line 48, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6399] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_63b.c | Line 56, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6400] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_64b.c | Line 39, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6401] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_64b.c | Line 54, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6402] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_64b.c | Line 65, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6403] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_65b.c | Line 35, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6404] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_65b.c | Line 46, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6405] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_65b.c | Line 53, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6406] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_66b.c | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6407] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_66b.c | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6408] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_66b.c | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6409] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_67b.c | Line 41, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6410] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_67b.c | Line 53, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6411] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_67b.c | Line 61, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6412] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_68b.c | Line 40, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6413] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_68b.c | Line 52, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6414] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_68b.c | Line 60, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6415] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_72b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6416] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_72b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6417] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_72b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6418] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_73b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6419] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_73b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6420] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_73b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6421] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_74b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6422] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_74b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6423] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_fprintf_74b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6424] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_22b.c | Line 34, Column 9
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6425] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_22b.c | Line 78, Column 9
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6426] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_51b.c | Line 35, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6427] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_51b.c | Line 46, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6428] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_52c.c | Line 35, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6429] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_52c.c | Line 46, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6430] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_53d.c | Line 35, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6431] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_53d.c | Line 46, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6432] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_54e.c | Line 35, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6433] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_54e.c | Line 46, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6434] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_62b.cpp | Line 68, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6435] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_63b.c | Line 36, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6436] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_63b.c | Line 48, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6437] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_64b.c | Line 39, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6438] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_64b.c | Line 54, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6439] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_65b.c | Line 35, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6440] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_65b.c | Line 46, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6441] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_66b.c | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6442] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_66b.c | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6443] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_67b.c | Line 41, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6444] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_67b.c | Line 53, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6445] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_68b.c | Line 40, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6446] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_68b.c | Line 52, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6447] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_72b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6448] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_72b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6449] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_73b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6450] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_73b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6451] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_74b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6452] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_printf_74b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6453] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_snprintf_62b.cpp | Line 68, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6454] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_22b.c | Line 38, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6455] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_22b.c | Line 67, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6456] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_22b.c | Line 82, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6457] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_22b.c | Line 97, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6458] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_51b.c | Line 39, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6459] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_51b.c | Line 60, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6460] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_51b.c | Line 77, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6461] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_52c.c | Line 39, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6462] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_52c.c | Line 60, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6463] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_52c.c | Line 77, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6464] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_53d.c | Line 39, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6465] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_53d.c | Line 60, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6466] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_53d.c | Line 77, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6467] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_54e.c | Line 39, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6468] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_54e.c | Line 60, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6469] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_54e.c | Line 77, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6470] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_62b.cpp | Line 68, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6471] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_63b.c | Line 39, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6472] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_63b.c | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6473] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_63b.c | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6474] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_64b.c | Line 39, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6475] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_64b.c | Line 64, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6476] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_64b.c | Line 85, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6477] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_65b.c | Line 39, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6478] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_65b.c | Line 55, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6479] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_65b.c | Line 67, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6480] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_66b.c | Line 39, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6481] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_66b.c | Line 62, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6482] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_66b.c | Line 80, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6483] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_67b.c | Line 44, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6484] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_67b.c | Line 66, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6485] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_67b.c | Line 84, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6486] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_68b.c | Line 43, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6487] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_68b.c | Line 65, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6488] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_68b.c | Line 83, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6489] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_72b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6490] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_72b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6491] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_72b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6492] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_73b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6493] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_73b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6494] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_73b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6495] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_74b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6496] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_74b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6497] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s02/CWE134_Uncontrolled_Format_String__char_file_vfprintf_74b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6498] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_22b.c | Line 38, Column 13
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6499] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_22b.c | Line 97, Column 13
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6500] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_51b.c | Line 39, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6501] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_51b.c | Line 60, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6502] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_52c.c | Line 39, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6503] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_52c.c | Line 60, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6504] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_53d.c | Line 39, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6505] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_53d.c | Line 60, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6506] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_54e.c | Line 39, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6507] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_54e.c | Line 60, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6508] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_62b.cpp | Line 68, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6509] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_63b.c | Line 39, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6510] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_63b.c | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6511] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_64b.c | Line 39, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6512] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_64b.c | Line 64, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6513] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_65b.c | Line 39, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6514] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_65b.c | Line 55, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6515] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_66b.c | Line 39, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6516] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_66b.c | Line 62, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6517] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_67b.c | Line 44, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6518] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_67b.c | Line 66, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6519] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_68b.c | Line 43, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6520] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_68b.c | Line 65, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6521] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_72b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6522] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_72b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6523] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_73b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6524] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_73b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6525] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_74b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6526] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_vprintf_74b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6527] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_22b.c | Line 39, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6528] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_22b.c | Line 70, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6529] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_22b.c | Line 87, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6530] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_22b.c | Line 104, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6531] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_51b.c | Line 40, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6532] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_51b.c | Line 63, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6533] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_51b.c | Line 82, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6534] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_52c.c | Line 40, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6535] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_52c.c | Line 63, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6536] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_52c.c | Line 82, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6537] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_53d.c | Line 40, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6538] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_53d.c | Line 63, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6539] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_53d.c | Line 82, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6540] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_54e.c | Line 40, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6541] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_54e.c | Line 63, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6542] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_54e.c | Line 82, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6543] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_62b.cpp | Line 68, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[6544] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_63b.c | Line 40, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6545] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_63b.c | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6546] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_63b.c | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6547] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_64b.c | Line 40, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6548] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_64b.c | Line 67, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6549] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_64b.c | Line 90, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6550] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_65b.c | Line 40, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6551] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_65b.c | Line 58, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6552] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_65b.c | Line 72, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6553] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_66b.c | Line 40, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6554] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_66b.c | Line 65, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6555] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_66b.c | Line 85, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6556] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_67b.c | Line 45, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6557] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_67b.c | Line 69, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6558] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_67b.c | Line 89, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6559] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_68b.c | Line 44, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6560] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_68b.c | Line 68, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6561] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_68b.c | Line 88, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6562] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_72b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6563] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_72b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6564] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_72b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6565] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_73b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6566] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_73b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6567] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_73b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6568] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_74b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6569] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_74b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6570] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_file_w32_vsnprintf_74b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6571] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_22b.c | Line 34, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6572] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_22b.c | Line 58, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6573] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_22b.c | Line 68, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6574] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_22b.c | Line 78, Column 9
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6575] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_51b.c | Line 50, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6576] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_51b.c | Line 61, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6577] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_51b.c | Line 68, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6578] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_52c.c | Line 50, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6579] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_52c.c | Line 61, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6580] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_52c.c | Line 68, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6581] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_53d.c | Line 50, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6582] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_53d.c | Line 61, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6583] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_53d.c | Line 68, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6584] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_54e.c | Line 50, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6585] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_54e.c | Line 61, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6586] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_54e.c | Line 68, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6587] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_63b.c | Line 51, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6588] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_63b.c | Line 63, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6589] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_63b.c | Line 71, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6590] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_64b.c | Line 54, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6591] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_64b.c | Line 69, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6592] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_64b.c | Line 80, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6593] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_65b.c | Line 50, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6594] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_65b.c | Line 61, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6595] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_65b.c | Line 68, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6596] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_66b.c | Line 52, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6597] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_66b.c | Line 64, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6598] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_66b.c | Line 72, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6599] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_67b.c | Line 56, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6600] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_67b.c | Line 68, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6601] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_67b.c | Line 76, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6602] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_68b.c | Line 55, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6603] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_68b.c | Line 67, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6604] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_68b.c | Line 75, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6605] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_72b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6606] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_72b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6607] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_72b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6608] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_73b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6609] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_73b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6610] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_73b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6611] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_74b.cpp | Line 37, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6612] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_74b.cpp | Line 49, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6613] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_fprintf_74b.cpp | Line 57, Column 5
Function 'fprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., fprintf("%s", user_input) instead of fprintf(user_input)
[6614] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_22b.c | Line 34, Column 9
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6615] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_22b.c | Line 78, Column 9
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6616] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_51b.c | Line 50, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6617] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_51b.c | Line 61, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6618] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_52c.c | Line 50, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6619] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_52c.c | Line 61, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6620] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_53d.c | Line 50, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6621] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_53d.c | Line 61, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6622] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_54e.c | Line 50, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6623] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_54e.c | Line 61, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6624] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_63b.c | Line 51, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6625] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_63b.c | Line 63, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6626] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_64b.c | Line 54, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6627] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_64b.c | Line 69, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6628] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_65b.c | Line 50, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6629] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_65b.c | Line 61, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6630] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_66b.c | Line 52, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6631] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_66b.c | Line 64, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6632] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_67b.c | Line 56, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6633] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_67b.c | Line 68, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6634] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_68b.c | Line 55, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6635] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_68b.c | Line 67, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6636] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_72b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6637] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_72b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6638] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_73b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6639] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_73b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6640] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_74b.cpp | Line 37, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6641] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_printf_74b.cpp | Line 49, Column 5
Function 'printf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., printf("%s", user_input) instead of printf(user_input)
[6642] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_22b.c | Line 38, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6643] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_22b.c | Line 67, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6644] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_22b.c | Line 82, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6645] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_22b.c | Line 97, Column 13
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6646] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_51b.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6647] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_51b.c | Line 75, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6648] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_51b.c | Line 92, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6649] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_52c.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6650] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_52c.c | Line 75, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6651] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_52c.c | Line 92, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6652] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_53d.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6653] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_53d.c | Line 75, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6654] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_53d.c | Line 92, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6655] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_54e.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6656] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_54e.c | Line 75, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6657] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_54e.c | Line 92, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6658] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_63b.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6659] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_63b.c | Line 76, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6660] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_63b.c | Line 94, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6661] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_64b.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6662] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_64b.c | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6663] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_64b.c | Line 100, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6664] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_65b.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6665] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_65b.c | Line 70, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6666] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_65b.c | Line 82, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6667] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_66b.c | Line 54, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6668] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_66b.c | Line 77, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6669] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_66b.c | Line 95, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6670] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_67b.c | Line 59, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6671] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_67b.c | Line 81, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6672] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_67b.c | Line 99, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6673] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_68b.c | Line 58, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6674] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_68b.c | Line 80, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6675] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_68b.c | Line 98, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6676] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_72b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6677] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_72b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6678] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_72b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6679] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_73b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6680] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_73b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6681] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_73b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6682] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_74b.cpp | Line 38, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6683] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_74b.cpp | Line 61, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6684] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vfprintf_74b.cpp | Line 79, Column 9
Function 'vfprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vfprintf("%s", user_input) instead of vfprintf(user_input)
[6685] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_22b.c | Line 38, Column 13
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6686] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_22b.c | Line 97, Column 13
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6687] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_51b.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6688] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_51b.c | Line 75, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6689] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_52c.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6690] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_52c.c | Line 75, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6691] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_53d.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6692] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_53d.c | Line 75, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6693] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_54e.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6694] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_54e.c | Line 75, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6695] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_63b.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6696] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_63b.c | Line 76, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6697] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_64b.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6698] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_64b.c | Line 79, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6699] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_65b.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6700] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_65b.c | Line 70, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6701] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_66b.c | Line 54, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6702] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_66b.c | Line 77, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6703] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_67b.c | Line 59, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6704] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_67b.c | Line 81, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6705] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_68b.c | Line 58, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6706] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_68b.c | Line 80, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6707] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_72b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6708] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_72b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6709] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_73b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6710] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_73b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6711] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_74b.cpp | Line 38, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6712] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_vprintf_74b.cpp | Line 61, Column 9
Function 'vprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vprintf("%s", user_input) instead of vprintf(user_input)
[6713] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_22b.c | Line 39, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6714] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_22b.c | Line 70, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6715] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_22b.c | Line 87, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6716] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_22b.c | Line 104, Column 13
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6717] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_51b.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6718] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_51b.c | Line 78, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6719] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_51b.c | Line 97, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6720] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_52c.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6721] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_52c.c | Line 78, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6722] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_52c.c | Line 97, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6723] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_53d.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6724] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_53d.c | Line 78, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6725] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_53d.c | Line 97, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6726] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_54e.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6727] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_54e.c | Line 78, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6728] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_54e.c | Line 97, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6729] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_63b.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6730] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_63b.c | Line 79, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6731] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_63b.c | Line 99, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6732] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_64b.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6733] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_64b.c | Line 82, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6734] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_64b.c | Line 105, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6735] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_65b.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6736] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_65b.c | Line 73, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6737] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_65b.c | Line 87, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6738] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_66b.c | Line 55, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6739] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_66b.c | Line 80, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6740] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_66b.c | Line 100, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6741] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_67b.c | Line 60, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6742] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_67b.c | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6743] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_67b.c | Line 104, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6744] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_68b.c | Line 59, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6745] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_68b.c | Line 83, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6746] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_68b.c | Line 103, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6747] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_72b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6748] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_72b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6749] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_72b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6750] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_73b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6751] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_73b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6752] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_73b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6753] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_74b.cpp | Line 39, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6754] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_74b.cpp | Line 64, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6755] Format String Vulnerability
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__char_listen_socket_w32_vsnprintf_74b.cpp | Line 84, Column 9
Function 'vsnprintf' uses a variable as format string, which could be controlled by an attacker
💡 Recommendation: Use a string literal as format string, e.g., vsnprintf("%s", user_input) instead of vsnprintf(user_input)
[6756] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__wchar_t_connect_socket_fprintf_62b.cpp | Line 129, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6757] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__wchar_t_connect_socket_printf_62b.cpp | Line 129, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6758] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s03/CWE134_Uncontrolled_Format_String__wchar_t_connect_socket_snprintf_62b.cpp | Line 129, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6759] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s04/CWE134_Uncontrolled_Format_String__wchar_t_connect_socket_vfprintf_62b.cpp | Line 129, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6760] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s04/CWE134_Uncontrolled_Format_String__wchar_t_connect_socket_vprintf_62b.cpp | Line 129, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6761] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s04/CWE134_Uncontrolled_Format_String__wchar_t_connect_socket_w32_vsnprintf_62b.cpp | Line 129, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6762] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s04/CWE134_Uncontrolled_Format_String__wchar_t_console_fprintf_62b.cpp | Line 66, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6763] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s04/CWE134_Uncontrolled_Format_String__wchar_t_console_printf_62b.cpp | Line 66, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6764] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s04/CWE134_Uncontrolled_Format_String__wchar_t_console_snprintf_62b.cpp | Line 66, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6765] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s04/CWE134_Uncontrolled_Format_String__wchar_t_console_vfprintf_62b.cpp | Line 66, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6766] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s04/CWE134_Uncontrolled_Format_String__wchar_t_console_vprintf_62b.cpp | Line 66, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6767] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s04/CWE134_Uncontrolled_Format_String__wchar_t_console_w32_vsnprintf_62b.cpp | Line 66, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6768] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s04/CWE134_Uncontrolled_Format_String__wchar_t_environment_fprintf_62b.cpp | Line 60, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6769] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s04/CWE134_Uncontrolled_Format_String__wchar_t_environment_printf_62b.cpp | Line 60, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6770] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s05/CWE134_Uncontrolled_Format_String__wchar_t_environment_snprintf_62b.cpp | Line 60, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6771] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s05/CWE134_Uncontrolled_Format_String__wchar_t_environment_vfprintf_62b.cpp | Line 60, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6772] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s05/CWE134_Uncontrolled_Format_String__wchar_t_environment_vprintf_62b.cpp | Line 60, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6773] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s05/CWE134_Uncontrolled_Format_String__wchar_t_environment_w32_vsnprintf_62b.cpp | Line 60, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6774] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s05/CWE134_Uncontrolled_Format_String__wchar_t_file_fprintf_62b.cpp | Line 68, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6775] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s05/CWE134_Uncontrolled_Format_String__wchar_t_file_printf_62b.cpp | Line 68, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6776] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s05/CWE134_Uncontrolled_Format_String__wchar_t_file_snprintf_62b.cpp | Line 68, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6777] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s05/CWE134_Uncontrolled_Format_String__wchar_t_file_vfprintf_62b.cpp | Line 68, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6778] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s05/CWE134_Uncontrolled_Format_String__wchar_t_file_vprintf_62b.cpp | Line 68, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6779] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE134_Uncontrolled_Format_String/s05/CWE134_Uncontrolled_Format_String__wchar_t_file_w32_vsnprintf_62b.cpp | Line 68, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6780] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_add_61b.c | Line 25, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6781] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_add_61b.c | Line 45, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6782] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_add_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6783] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_add_62b.cpp | Line 46, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6784] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_add_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6785] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_add_64b.c | Line 43, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6786] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_add_64b.c | Line 57, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6787] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_multiply_61b.c | Line 25, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6788] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_multiply_61b.c | Line 45, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6789] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_multiply_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6790] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_multiply_62b.cpp | Line 46, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6791] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_multiply_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6792] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_multiply_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6793] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_multiply_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6794] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_square_61b.c | Line 27, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6795] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_square_61b.c | Line 47, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6796] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_square_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6797] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_square_62b.cpp | Line 46, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6798] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_square_64b.c | Line 27, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6799] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_square_64b.c | Line 45, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6800] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_fscanf_square_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6801] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_max_add_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6802] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_max_add_64b.c | Line 43, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6803] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_max_add_64b.c | Line 57, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6804] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_max_multiply_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6805] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_max_multiply_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6806] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_max_multiply_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6807] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_max_square_64b.c | Line 27, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6808] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_max_square_64b.c | Line 45, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6809] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_max_square_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6810] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_rand_add_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6811] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_rand_add_64b.c | Line 43, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6812] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_rand_add_64b.c | Line 57, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6813] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_rand_multiply_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6814] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_rand_multiply_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6815] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_rand_multiply_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6816] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_rand_square_64b.c | Line 27, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6817] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_rand_square_64b.c | Line 45, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6818] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__char_rand_square_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6819] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__int64_t_fscanf_add_62b.cpp | Line 29, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6820] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__int64_t_fscanf_add_62b.cpp | Line 47, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6821] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__int64_t_fscanf_multiply_62b.cpp | Line 29, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6822] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s01/CWE190_Integer_Overflow__int64_t_fscanf_multiply_62b.cpp | Line 47, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6823] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int64_t_fscanf_square_62b.cpp | Line 30, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6824] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int64_t_fscanf_square_62b.cpp | Line 48, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6825] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_add_61b.c | Line 88, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6826] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_add_61b.c | Line 162, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6827] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_add_62b.cpp | Line 91, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6828] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_add_62b.cpp | Line 163, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6829] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_add_64b.c | Line 47, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6830] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_add_64b.c | Line 65, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6831] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_add_64b.c | Line 79, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6832] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_multiply_61b.c | Line 88, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6833] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_multiply_61b.c | Line 162, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6834] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_multiply_62b.cpp | Line 91, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6835] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_multiply_62b.cpp | Line 163, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6836] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_multiply_64b.c | Line 47, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6837] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_multiply_64b.c | Line 66, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6838] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_multiply_64b.c | Line 81, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6839] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_square_61b.c | Line 90, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6840] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_square_61b.c | Line 164, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6841] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_square_62b.cpp | Line 91, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6842] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_square_62b.cpp | Line 163, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6843] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_square_64b.c | Line 49, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6844] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_square_64b.c | Line 67, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6845] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_connect_socket_square_64b.c | Line 81, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6846] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_fgets_add_61b.c | Line 32, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6847] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_fgets_add_61b.c | Line 63, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6848] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_fgets_add_62b.cpp | Line 35, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6849] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_fgets_add_62b.cpp | Line 64, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6850] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_fgets_add_64b.c | Line 27, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6851] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_fgets_add_64b.c | Line 45, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6852] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s02/CWE190_Integer_Overflow__int_fgets_add_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6853] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fgets_multiply_61b.c | Line 32, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6854] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fgets_multiply_61b.c | Line 63, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6855] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fgets_multiply_62b.cpp | Line 35, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6856] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fgets_multiply_62b.cpp | Line 64, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6857] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fgets_multiply_64b.c | Line 27, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6858] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fgets_multiply_64b.c | Line 46, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6859] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fgets_multiply_64b.c | Line 61, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6860] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fgets_square_61b.c | Line 34, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6861] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fgets_square_61b.c | Line 65, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6862] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fgets_square_62b.cpp | Line 35, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6863] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fgets_square_62b.cpp | Line 64, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6864] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fgets_square_64b.c | Line 29, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6865] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fgets_square_64b.c | Line 47, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6866] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fgets_square_64b.c | Line 61, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6867] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_add_61b.c | Line 25, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6868] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_add_61b.c | Line 45, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6869] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_add_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6870] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_add_62b.cpp | Line 46, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6871] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_add_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6872] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_add_64b.c | Line 43, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6873] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_add_64b.c | Line 57, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6874] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_multiply_61b.c | Line 25, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6875] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_multiply_61b.c | Line 45, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6876] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_multiply_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6877] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_multiply_62b.cpp | Line 46, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6878] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_multiply_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6879] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_multiply_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6880] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_multiply_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6881] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_square_61b.c | Line 27, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6882] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_square_61b.c | Line 47, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6883] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_square_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6884] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_square_62b.cpp | Line 46, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6885] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_square_64b.c | Line 27, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6886] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_square_64b.c | Line 45, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6887] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_fscanf_square_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6888] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_add_61b.c | Line 97, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6889] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_add_61b.c | Line 184, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6890] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_add_64b.c | Line 47, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6891] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_add_64b.c | Line 65, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6892] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_add_64b.c | Line 79, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6893] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_multiply_61b.c | Line 97, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6894] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_multiply_61b.c | Line 184, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6895] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_multiply_64b.c | Line 47, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6896] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_multiply_64b.c | Line 66, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6897] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_multiply_64b.c | Line 81, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6898] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_square_61b.c | Line 99, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6899] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_square_61b.c | Line 186, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6900] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_square_64b.c | Line 49, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6901] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_square_64b.c | Line 67, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6902] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_listen_socket_square_64b.c | Line 81, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6903] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_max_add_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6904] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_max_add_64b.c | Line 43, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6905] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_max_add_64b.c | Line 57, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6906] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_max_multiply_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6907] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_max_multiply_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6908] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_max_multiply_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6909] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_max_square_64b.c | Line 27, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6910] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_max_square_64b.c | Line 45, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6911] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s03/CWE190_Integer_Overflow__int_max_square_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6912] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__int_rand_add_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6913] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__int_rand_add_64b.c | Line 43, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6914] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__int_rand_add_64b.c | Line 57, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6915] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__int_rand_multiply_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6916] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__int_rand_multiply_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6917] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__int_rand_multiply_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6918] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__int_rand_square_64b.c | Line 27, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6919] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__int_rand_square_64b.c | Line 45, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6920] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__int_rand_square_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6921] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__short_fscanf_add_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6922] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__short_fscanf_add_62b.cpp | Line 46, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6923] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__short_fscanf_multiply_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6924] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__short_fscanf_multiply_62b.cpp | Line 46, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6925] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__short_fscanf_square_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6926] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s04/CWE190_Integer_Overflow__short_fscanf_square_62b.cpp | Line 46, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6927] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s05/CWE190_Integer_Overflow__unsigned_int_fscanf_add_61b.c | Line 25, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6928] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s05/CWE190_Integer_Overflow__unsigned_int_fscanf_add_61b.c | Line 45, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6929] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s05/CWE190_Integer_Overflow__unsigned_int_fscanf_add_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6930] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s05/CWE190_Integer_Overflow__unsigned_int_fscanf_add_62b.cpp | Line 46, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6931] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s05/CWE190_Integer_Overflow__unsigned_int_fscanf_multiply_61b.c | Line 25, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6932] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s05/CWE190_Integer_Overflow__unsigned_int_fscanf_multiply_61b.c | Line 45, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6933] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s05/CWE190_Integer_Overflow__unsigned_int_fscanf_multiply_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6934] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s05/CWE190_Integer_Overflow__unsigned_int_fscanf_multiply_62b.cpp | Line 46, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6935] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s05/CWE190_Integer_Overflow__unsigned_int_fscanf_square_61b.c | Line 27, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6936] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s05/CWE190_Integer_Overflow__unsigned_int_fscanf_square_61b.c | Line 47, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6937] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s05/CWE190_Integer_Overflow__unsigned_int_fscanf_square_62b.cpp | Line 28, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6938] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s05/CWE190_Integer_Overflow__unsigned_int_fscanf_square_62b.cpp | Line 46, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6939] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__char_fscanf_postinc_61b.c | Line 25, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6940] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__char_fscanf_postinc_61b.c | Line 45, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6941] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__char_fscanf_postinc_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6942] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__char_fscanf_postinc_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6943] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__char_fscanf_postinc_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6944] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__char_max_postinc_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6945] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__char_max_postinc_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6946] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__char_max_postinc_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6947] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__char_rand_postinc_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6948] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__char_rand_postinc_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6949] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__char_rand_postinc_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6950] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_connect_socket_postinc_61b.c | Line 88, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6951] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_connect_socket_postinc_61b.c | Line 162, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6952] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_connect_socket_postinc_64b.c | Line 47, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6953] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_connect_socket_postinc_64b.c | Line 66, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6954] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_connect_socket_postinc_64b.c | Line 81, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6955] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_fgets_postinc_61b.c | Line 32, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6956] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_fgets_postinc_61b.c | Line 63, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6957] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_fgets_postinc_64b.c | Line 27, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6958] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_fgets_postinc_64b.c | Line 46, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6959] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_fgets_postinc_64b.c | Line 61, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6960] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_fscanf_postinc_61b.c | Line 25, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6961] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_fscanf_postinc_61b.c | Line 45, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6962] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_fscanf_postinc_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6963] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_fscanf_postinc_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6964] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_fscanf_postinc_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6965] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_listen_socket_postinc_61b.c | Line 97, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6966] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_listen_socket_postinc_61b.c | Line 184, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6967] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_listen_socket_postinc_64b.c | Line 47, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6968] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_listen_socket_postinc_64b.c | Line 66, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6969] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_listen_socket_postinc_64b.c | Line 81, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6970] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_max_postinc_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6971] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_max_postinc_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6972] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_max_postinc_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6973] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_rand_postinc_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6974] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_rand_postinc_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6975] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__int_rand_postinc_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6976] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__unsigned_int_fscanf_postinc_61b.c | Line 25, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6977] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s06/CWE190_Integer_Overflow__unsigned_int_fscanf_postinc_61b.c | Line 45, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6978] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__char_fscanf_preinc_61b.c | Line 25, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6979] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__char_fscanf_preinc_61b.c | Line 45, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6980] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__char_fscanf_preinc_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6981] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__char_fscanf_preinc_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6982] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__char_fscanf_preinc_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6983] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__char_max_preinc_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6984] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__char_max_preinc_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6985] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__char_max_preinc_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6986] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__char_rand_preinc_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6987] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__char_rand_preinc_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6988] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__char_rand_preinc_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: char* dataPtr = NULL;
[6989] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_connect_socket_preinc_61b.c | Line 88, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6990] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_connect_socket_preinc_61b.c | Line 162, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6991] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_connect_socket_preinc_64b.c | Line 47, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6992] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_connect_socket_preinc_64b.c | Line 66, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6993] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_connect_socket_preinc_64b.c | Line 81, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6994] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_fgets_preinc_61b.c | Line 32, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6995] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_fgets_preinc_61b.c | Line 63, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[6996] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_fgets_preinc_64b.c | Line 27, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6997] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_fgets_preinc_64b.c | Line 46, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6998] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_fgets_preinc_64b.c | Line 61, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[6999] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_fscanf_preinc_61b.c | Line 25, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7000] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_fscanf_preinc_61b.c | Line 45, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7001] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_fscanf_preinc_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[7002] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_fscanf_preinc_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[7003] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_fscanf_preinc_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[7004] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_listen_socket_preinc_61b.c | Line 97, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7005] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_listen_socket_preinc_61b.c | Line 184, Column 20
Use of unsafe function 'atoi' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7006] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_listen_socket_preinc_64b.c | Line 47, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[7007] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_listen_socket_preinc_64b.c | Line 66, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[7008] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_listen_socket_preinc_64b.c | Line 81, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[7009] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_max_preinc_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[7010] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_max_preinc_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[7011] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_max_preinc_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[7012] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_rand_preinc_64b.c | Line 25, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[7013] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_rand_preinc_64b.c | Line 44, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[7014] Uninitialized Pointer
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__int_rand_preinc_64b.c | Line 59, Column 5
Pointer 'dataPtr' declared but not initialized
💡 Recommendation: Initialize pointer to NULL or valid address: int* dataPtr = NULL;
[7015] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__unsigned_int_fscanf_preinc_61b.c | Line 25, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7016] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE190_Integer_Overflow/s07/CWE190_Integer_Overflow__unsigned_int_fscanf_preinc_61b.c | Line 45, Column 5
Use of unsafe function 'fscanf' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7017] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_calloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__char_calloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7018] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_calloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__char_calloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7019] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_calloc_62b.cpp | Line 33, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[7020] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_calloc_62b.cpp | Line 47, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[7021] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_calloc_62b.cpp | Line 58, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[7022] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_malloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__char_malloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7023] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_malloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__char_malloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7024] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_malloc_62b.cpp | Line 33, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[7025] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_malloc_62b.cpp | Line 47, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[7026] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_malloc_62b.cpp | Line 58, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[7027] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_realloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__char_realloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7028] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_realloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__char_realloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7029] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_realloc_62b.cpp | Line 33, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[7030] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_realloc_62b.cpp | Line 47, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[7031] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__char_realloc_62b.cpp | Line 58, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[7032] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__int64_t_calloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__int64_t_calloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7033] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__int64_t_calloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__int64_t_calloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7034] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__int64_t_malloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__int64_t_malloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7035] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__int64_t_malloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__int64_t_malloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7036] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__int64_t_realloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__int64_t_realloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7037] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__int64_t_realloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__int64_t_realloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7038] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__int_calloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__int_calloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7039] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__int_calloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__int_calloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7040] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__int_malloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__int_malloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7041] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__int_malloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__int_malloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7042] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__int_realloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__int_realloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7043] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s01/CWE401_Memory_Leak__int_realloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__int_realloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7044] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s02/CWE401_Memory_Leak__strdup_char_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__strdup_char_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7045] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s02/CWE401_Memory_Leak__strdup_char_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__strdup_char_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7046] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s02/CWE401_Memory_Leak__strdup_char_62b.cpp | Line 48, Column 5
Use of unsafe function 'strcpy' which does not perform bounds checking
💡 Recommendation: Use strncpy() instead and ensure proper null termination
[7047] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__strdup_wchar_t_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__strdup_wchar_t_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7048] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__strdup_wchar_t_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__strdup_wchar_t_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7049] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__strdup_wchar_t_62b.cpp | Line 48, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7050] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__struct_twoIntsStruct_calloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__struct_twoIntsStruct_calloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7051] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__struct_twoIntsStruct_calloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__struct_twoIntsStruct_calloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7052] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__struct_twoIntsStruct_malloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__struct_twoIntsStruct_malloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7053] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__struct_twoIntsStruct_malloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__struct_twoIntsStruct_malloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7054] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__struct_twoIntsStruct_realloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__struct_twoIntsStruct_realloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7055] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__struct_twoIntsStruct_realloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__struct_twoIntsStruct_realloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7056] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__twoIntsStruct_calloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__twoIntsStruct_calloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7057] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__twoIntsStruct_calloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__twoIntsStruct_calloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7058] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__twoIntsStruct_malloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__twoIntsStruct_malloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7059] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__twoIntsStruct_malloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__twoIntsStruct_malloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7060] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__twoIntsStruct_realloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__twoIntsStruct_realloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7061] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__twoIntsStruct_realloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__twoIntsStruct_realloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7062] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_calloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__wchar_t_calloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7063] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_calloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__wchar_t_calloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7064] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_calloc_62b.cpp | Line 33, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7065] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_calloc_62b.cpp | Line 47, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7066] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_calloc_62b.cpp | Line 58, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7067] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_malloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__wchar_t_malloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7068] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_malloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__wchar_t_malloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7069] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_malloc_62b.cpp | Line 33, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7070] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_malloc_62b.cpp | Line 47, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7071] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_malloc_62b.cpp | Line 58, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7072] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_realloc_43.cpp | Line 0, Column 0
Function 'CWE401_Memory_Leak__wchar_t_realloc_43 { #ifndef OMITBAD static void badSource' receives pointer parameter '&data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7073] Memory Leak
MEDIUM
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_realloc_61b.c | Line 0, Column 0
Function 'CWE401_Memory_Leak__wchar_t_realloc_61b_badSource' receives pointer parameter 'data' but does not free it
💡 Recommendation: Call delete/delete[] or free() to release allocated memory before function returns
[7074] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_realloc_62b.cpp | Line 33, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7075] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_realloc_62b.cpp | Line 47, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking
[7076] Buffer Overflow
HIGH
📁 ./Juliet-TestCases/CWE401_Memory_Leak/s03/CWE401_Memory_Leak__wchar_t_realloc_62b.cpp | Line 58, Column 5
Use of unsafe function 'wcscpy' which does not perform bounds checking
💡 Recommendation: Use a safer alternative with bounds checking